Ann, the security administrator, has been reviewing logs and has found several overnight sales personnel are
accessing the finance department’s network shares.
Which of the following security controls should be implemented to BEST remediate this?
Separation of duties
Time of day restrictions
Role based access