Watch this video on YouTube
Which of the following is a common approach for implementing security controls in an information system?