An administrator has recently configured security settings for a cloud environment to restrict access to a sensitive system. Despite the configurations, unauthorized users are still able to access the system. What is the BEST course of action to troubleshoot this problem?
Change the encryption methods being used for data transmission within the cloud environment.
Increase the logging level on all systems to trace the unauthorized access.
Review all applicable security group rules to identify any permissive or conflicting rules allowing the access.
Focus solely on revising the current firewall settings without evaluating the specific security group configurations.