Question:
Which of the following is not typically used to verify that a provisioning process was followed in a way that ensures that the organization's security policy is being followed? Manual review of permissions, log review, review the audit trail, or signature based decision making?