Which of the following should a security administrator adhere to when setting up a new set of firewall rules?
A. Disaster recovery plan
B. Incident response procedure
C. Business continuity plan
D. Change management procedure
A. Disaster recovery plan
B. Incident response procedure
C. Business continuity plan
D. Change management procedure