A company has implemented a new policy to enhance the security of user accounts. The policy requires an automated process to identify and handle inactive accounts. Which of the following BEST aligns with the company's policy?
|Architecture and Design
|Operations and Incident Response
|Governance, Risk, and Compliance
|Attacks, Threats, and Vulnerabilities