Which of the following processes culminates in an agreement between key players that a system
in its current configuration and operation provides adequate protection controls
A.
Certification and accreditation (C&A)
B.
Risk Management
C.
Information systems security engineering (ISSE)
D.
Information Assurance (IA)