A web-based front end for a business intelligence application uses pass-through authentication to authenticate users. The application then uses a service account, to perform queries and look up data m a database A security analyst discovers employees are accessing data sets they have not been authorized to use.
Which of the following will fix the cause of the issue?
A . Change the security model to force the users to access the database as themselves
B . Parameterize queries to prevent unauthorized SQL queries against the database
C . Configure database security logging using syslog or a SIEM
D . Enforce unique session IDs so users do not get a reused session ID
Answer: B