An organization wishes to enforce policies that restrict access to sensitive resources from unauthorized network segments. Which security rule should primarily be configured to manage this access?
Content filtering
MAC filtering
Disable unused ports
Access control list (ACL)