For the first time, the procurement department has requested that IT grant remote access to third-party suppliers. Which of the following is the BEST course of action for IT in responding to the request?
A. Propose a solution after analyzing IT risk
B. Design and implement key authentication controls
C. Design and implement a secure remote access process
D. Adequate internal standards to fit the new business case
A. Propose a solution after analyzing IT risk
B. Design and implement key authentication controls
C. Design and implement a secure remote access process
D. Adequate internal standards to fit the new business case