During a recent security audit, an analyst discovers that encrypted traffic is passing through the organization's firewall without inspection, potentially allowing harmful content to go undetected. Which of the following should the organization implement to address this security gap?
Enforcement of application control policies
Configuration of HTTPS deep packet inspection rules
SSL decryption policies on the firewall
Implementation of URL filtering