Organizations should ensure that all security controls addressing information system decommissioning, such as media sanitization and configuration management, are executed during __________?
A.Procurement
B.System Decommissioning
C.Privacy Impact Assessment
D.Vendor Selection