During which of the following NIST risk management framework steps would an information system security engineer identify inherited security controls and tailor those controls to the system?
A. Categorize
B. Select
C. Implement
D. Access
During which of the following NIST risk management framework steps would an information system security engineer identify inherited security controls and tailor those controls to the system?
A. Categorize
B. Select
C. Implement
D. Access