Last Updated on December 21, 2021 by InfraExam
Which of the following is the MOST effective mitigation strategy to protect confidential information from insider threats?
- Performing an entitlement review process
- Implementing authentication mechanisms
- Defining segregation of duties
- Establishing authorization controls