Join us on Discord!
An organization is integrating two information systems with different security requirements. What should be considered when selecting security controls for the integrated system?