cisa video for you are an information system auditor of HDA Inc. You are assessing methods to mitigate the risk of unintentional changes to the source code.
You are an information system auditor of HDA Inc. You are assessing methods to mitigate the risk of unintentional changes to the source code. Which of the following is the most effective method for this purpose?