A manager suspects that an IT employee with elevated database access may be knowingly modifying financial transactions for the benefit of a competitor.
Which of the following practices should the manager implement to validate the concern?
A . Separation of duties
B . Mandatory vacations
C . Background checks
D . Security awareness training
Answer: A