An IT director is looking to reduce the footprint of their company's server environment. They have decided to move several internally developed software applications to an alternate environment, supported by an external company. They will still maintain the software, operating systems and configurations, but will not manage the physical hardware. Which of the following BEST describes this arrangement?
|Compliance and Operational Security|
|Threats and Vulnerabilities|
|Application, Data and Host Security|
|Access Control and Identity Management|