Which of the following would be used to mitigate this issue so that only security administrators can make changes to the firewall?
Which of the following risk mitigation strategies will allow Ann, a security analyst, to enforce least privilege principles?