In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?
A. Data encryption
B. Access to the hardware
C. Compressed customer data
D. Non-standard event logs
A. Data encryption
B. Access to the hardware
C. Compressed customer data
D. Non-standard event logs