A programmer plans to change the server variable in the coding of an authentication function for a proprietary sales application. Which process should be followed before implementing the new routine on the production application server?
A.
Change management
B.
Secure disposal
C.
Password complexity
D.
Chain of custody