Sara, a companys security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building. Sara should immediately implement which of the following?
A.
Acceptable Use Policy
B.
Physical security controls
C.
Technical controls
D.
Security awareness training