Crucial Technologies wants to ensure that they are protecting their assets from risk. They use security controls to lower the risk level down to a point that is within what the company can tolerate. What is the risk called that remains after the security controls are put in place?
|Governance, Risk, and Compliance|
|Architecture and Design|
|Operations and Incident Response|
|Attacks, Threats, and Vulnerabilities|