Which of the following can you use to implement strict governance and ensure that the right people have access to the right resources, and only when they need it?
1) Access control
2) Encryption
3) Firewalls
4) Intrusion detection systems