Which step in the EMC information-centric security delivery process uses encryption and key management as the primary means to provide confidentiality and integrity?

A.
Ensure compliance
B.
Securing identities and access
C.
Securing the data
D.
Securing the infrastructure