The Information Security Manager (ISM) at Smith Consultants Inc. introduces the following
measures to assure information security:
– The security requirements for the network are specified.
– A test environment is set up for the purpose of testing reports coming from the database.
– The various employee functions are assigned corresponding access rights.
– RFID access passes are introduced for the building.
Which one of these measures is not a technical measure?

A.
The specification of requirements for the network
B.
Setting up a test environment
C.
Introducing a logical access policy
D.
Introducing RFID access passes