In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?
A. Access to the hardware
B. Data encryption
C. Non-standard event logs
D. Compressed customer data
A. Access to the hardware
B. Data encryption
C. Non-standard event logs
D. Compressed customer data