Which of the following will mitigate the risk of users who have access to an instance modifying the system configurations?