Ann, the security administrator, has been reviewing logs and has found several overnight sales personnel are
accessing the finance department’s network shares.
Which of the following security controls should be implemented to BEST remediate this?
A.
Mandatory access
B.
Separation of duties
C.
Time of day restrictions
D.
Role based access