A company has gone through several upgrades on their network but unfortunately have no way of identifying who approved the upgrades. Which of the following should be implemented to track this type of work?
A. Change management
B. Asset management
C. Access log
D. Baselines