A company uses an application that controls who can connect to a sensitive database and what they can do. What is this security feature called?
A. penetration testing.
B. identity and access management
C. program and product management
D. governance and compliance