The configuration management plan should PRIMARILY be based upon input from:
A. business process owners.
B. the information security manager.
C. the security steering committee.
D. IT senior management.
A. business process owners.
B. the information security manager.
C. the security steering committee.
D. IT senior management.