An audit has revealed that database administrators are also responsible for auditing database changes and
backup logs. Which of the following access control methodologies would BEST mitigate this concern?
A.
Time of day restrictions
B.
Principle of least privilege
C.
Role-based access control
D.
Separation of duties