This is a dedicated watch page for a single video.
Jane is a security analyst who has been assigned to implement some security controls on a new information system for her organization. As part of the implementation, she realizes that some of the controls specified in the organization's baseline controls are not relevant to the new system. What should Jane do in this situation?