Answer:
The best approach is to employ Risk Assessment
Step-by-step explanation:
Executing Risk Assessment separately for either physical security or technological security makes implementing recommendations easier as regards that which has a higher priority of protection in comparison to the duo mentioned.