A software development company wants to implement a digital rights management solution to protect its intellectual property. Which of the following should the company implement to enforce software digital rights?
|Compliance and Operational Security|
|Threats and Vulnerabilities|
|Application, Data and Host Security|
|Access Control and Identity Management|