An organization is reviewing its network security strategy to prevent unauthorized access to its sensitive data. Which of the following implementations aligns BEST with the principles of defense in depth to protect the network from various attack vectors?
Implementing network segmentation enforcement to create separated zones of access
Deploying a honeypot to divert attacks from production servers
Enabling a client-to-site VPN for remote employee access
Enforcing strong password complexity requirements for all user accounts