Which of the following is the BEST way to manage the risk associated with malicious activities performed by database administrators (DBAs)?