Full AWS Practitioner Certification Question

Which of the following is a common approach for implementing security controls in an information system?