Full AWS Practitioner Certification Question

An organization is integrating two information systems with different security requirements. What should be considered when selecting security controls for the integrated system?