A programmer has decided to alter the server variable in the coding of an authentication function for a proprietary sales application. Before implementing the new routine on the production application server, which of the following processes should be followed?
A.
Change management
B.
Secure disposal
C.
Password complexity
D.
Chain of custody