An audit has revealed that database administrators are also responsible for auditing database changes and backup logs. Which of the following access control
methodologies would BEST mitigate this concern?
A.
Time of day restrictions
B.
Principle of least privilege
C.
Role-based access control
D.
Separation of duties