Watch this video on YouTube
Your organization is in the midst of establishing security baselines. What primary criterion should be the bedrock for shaping these baselines?