A cybersecurity analyst is tasked with recommending a control to mitigate the risk of remote code execution due to a vulnerability found in a web application. Which of the following is the BEST recommendation to address this specific threat?
Implementing thorough input validation on user-supplied data
Regular patch management of the operating system and all applications
Deployment of an Intrusion Detection System (IDS)/Intrusion Prevention System (IPS)
Enhancing session management controls
Installation of a firewall with specific rules to block suspicious traffic