CISA Certified Information Systems Auditor – Question1170

Which of the following is the MOST effective mitigation strategy to protect confidential information from insider threats?

A.
Implementing authentication mechanisms
B. Performing an entitlement review process
C. Defining segregation of duties
D. Establishing authorization controls.

Correct Answer: D