While investigating network traffic, a cloud administrator discovers the monthly billing has increased substantially. Upon further review, it appears the servers have been compromised, and sensitive files have been exfiltrated. Which of the following can be implemented to maintain data confidentiality?
A. Hardening
B. IAM
C. Encryption
D. IPSec
A. Hardening
B. IAM
C. Encryption
D. IPSec