Answer:
"CBAs" would be the appropriate answer.
Step-by-step explanation:
- The CBAs system was intended to incorporate various business practices and knowledge across multiple security experts as well as provide a structured process to match application development policies and procedures with either the institution's threat analysis.
- As either a consequence, a structure is developed to enhance their safety infrastructure of business process development.