Comprehensive and Detailed Step-by-Step Explanation:Justifying investments in information security requires aligning proposals with business objectives to gain management approval. * A. Vulnerability scan results: These provide technical insights but are insufficient for high-level justification. * B. Competitor benchmark analysis: While useful, this is less relevant than demonstrating direct alignment with organizational needs. * C. Previous security budget: Historical data may provide context but does not justify future needs. * D. Business requirements: This is the BEST answer because aligning security investments with business objectives demonstrates the value and necessity of the program to stakeholders. Reference: CISM Job Practice Area 1 (Information Security Governance) focuses on aligning security initiatives with business goals to secure buy-in.