Which of the following should be the PRIMARY consideration when implementing controls for monitoring user activity logs?
A . Building correlations between logs collected from different sources
B . Ensuring the control is proportional to the risk
C . Implementing log analysis tools to automate controls
D . Ensuring availability of resources for log analysis
Answer: D