Which of the following is the PRIMARY role of the first line of defense with respect to information security policies?
Draft the information security policy.
Approve the information security policy.
Audit the implementation of the information security policy.
Implement controls in response to the policy requirements.
Submit