A company implements the following access control methodology based on the following data classifications:
The Chief Information Security Officer (CISO) wants to implement an additional layer of access control based on the geographic location of the underlying system that processes and stores data. The additional layer will be added to the existing access control system. Which of the following components must be implemented to achieve these goals? (Choose two.)
SangSang
Highly Voted 11 months, 2 weeks ago