Changes to a Trusted Computing Base (TCB) system that could impact the security posture of that
system and trigger a recertification activity are documented in the

A.
security impact analysis.
B.
structured code review.
C.
routine self assessment.
D.
cost benefit analysis.
Explanation: