The company is considering issuing non-standard tablet computers to executive management.
Which of the following is the FIRST step the security manager should perform?
A.
Apply standard security policy settings to the devices.
B.
Set up an access control system to isolate the devices from the network.
C.
Integrate the tablets into standard remote access systems.
D.
Develop the use case for the devices and perform a risk analysis.