A security manager is discussing change in the security posture of the network, if a proposed application is approved for deployment. Which of the following is the MOST important the security manager must rely upon to help make this determination?
A. Ports used by new application
B. Protocols/services used by new application
C. Approved configuration items
D. Current baseline configuration