A company is investigating a data compromise where data exfiltration occurred. Prior to the investigation, the supervisor terminates an employee as a result of the suspected data l
oss. During the investigation, the supervisor is absent for the interview, and little evidence can be provided form the role-based authentication system in use by the company.
The situation can be identified for future mitigation as which of the following
?
A. Job rotation
B. Log failure
C. Lack of training
D. Insider threat