During a recent security audit, an analyst discovers that encrypted traffic is passing through the organization's firewall without inspection, potentially allowing harmful content to go undetected. Which of the following should the organization implement to address this security gap?
Implementation of URL filtering
Configuration of HTTPS deep packet inspection rules
SSL decryption policies on the firewall
Enforcement of application control policies