Watch this video on YouTube
Ratio Corp is implementing security controls for its new information system, which will process sensitive customer data. Which of the following is the best approach for implementing security controls in this scenario?