What is the best defense against privilege escalation vulnerability?
A.
Patch systems regularly and upgrade interactive login privileges at the system administrator level.
B.
Run administrator and applications on least privileges and use a content registry for tracking.
C.
Run services with least privileged accounts and implement multi-factor authentication and authorization.
D.
Review user roles and administrator privileges for maximum utilization of automation services.