A company is looking for the best strategy to ensure that sensitive documents cannot be accessed by unauthorized personnel but needs to ensure that these documents remain readily available to authorized users. Which of the following security measures best aligns with the company's needs while emphasizing the principle of ensuring the sensitive documents remain confidential and are easily available for authorized users?
Intrusion detection systems to monitor for unauthorized access
Encryption of sensitive documents
Implementation of strict access controls
Regular backup systems