cgrc video for john is a system owner who is responsible for implementing security controls for his organization's information system. He has identified several
John is a system owner who is responsible for implementing security controls for his organization's information system. He has identified several controls that are not practical to implement in the system due to technical limitations. What should John do in this situation?