Watch this video on YouTube
After undertaking a security assessment of a production system, the information security manager is MOST likely to: