Which of the following will mitigate the risk of users who have access to an instance modifying the system configurations?
A . Implement whole-disk encryption
B . Deploy the latest OS patches
C . Deploy an anti-malware solution
D . Implement mandatory access control
Answer: D