Which of the following is the BEST control to mitigate the risk of shadow IT?
Intrusion detection system (IDS)
Vendor management reviews
Vulnerability scanning
Security awareness training
Submit