Which of the following is BEST carried out immediately after a security breach is discovered?

A.
Risk transference
B.
Access control revalidation
C.
Change management
D.
Incident management
Explanation:
Incident management is the steps followed when security incident occurs.