Which of the following is the MOST effective way to ensure information security policies are followed?
A . Require sign-off on acceptable use policies.
B . Require regular security awareness training.
C . Provide detailed security procedures.
D . Perform a gap analysis.
Answer: C