Watch this video on YouTube
An information security manager is tasked with scrutinizing change requests that come in. In this capacity, which facet should the manager prioritize to ascertain when delving into these change requests?