Watch this video on YouTube
An organization is implementing a new IT system with multiple interconnected components. Which of the following approaches should be used to ensure the security of the entire system?