A company is reviewing their security controls for critical infrastructure and needs to decide on the deployment of a mechanism that should ensure maximum uptime. However, during a network outage or a device failure, they want the mechanism to prioritize network availability over strict security to maintain business operations. Which of the following configurations would BEST align with the company's requirements?
Implement a fail-open mechanism on security devices.
Set all security devices to a fail-close setting.
Configure a high availability cluster for all critical systems.
Deploy an additional layer of intrusion prevention systems.