A company offers a hardware security appliance to customers that provides remote administration of a device on the customer's network. Customers are not authorized to alter the configuration. The company deployed a software process to manage unauthorized changes to the appliance, log them, and forward them to a central repository for evaluation. Which of the following processes is the company using to ensure the appliance is not altered from its original configured state?
A. CI/CD
B. Software assurance
C. Anti-tamper
D. Change management
A. CI/CD
B. Software assurance
C. Anti-tamper
D. Change management