An audit has revealed that database administrators are also responsible for auditing database changes and backup logs.
Which of the following access control methodologies would BEST mitigate this con
cern?
A. Time of day restrictions
B. Principle of least privilege
C. Role-based access control
D. Separation of duties