Which of the following documents would be the BEST reference to determine whether access control mechanisms are appropriate for a critical application?
A. User security procedures
B. Business process flow
C. IT security policy
D. Regulatory requirements
A. User security procedures
B. Business process flow
C. IT security policy
D. Regulatory requirements