Which of the following BEST validates that security controls are implemented in a new business process?
A. Assess the process according to information security policy.
B. Benchmark the process against industry practices.
C. Verify the use of a recognized control framework.
D. Review the process for conformance with information security best practices.
A. Assess the process according to information security policy.
B. Benchmark the process against industry practices.
C. Verify the use of a recognized control framework.
D. Review the process for conformance with information security best practices.