This is a dedicated watch page for a single video.
Company QRS is implementing a new IT system and is concerned about potential security breaches. Which security control should be implemented to ensure that access to the system is restricted to only those who need it?