A company requires a method to precisely define and enforce who can access their proprietary database application, ensuring that only specific employees are able to retrieve or modify data. What is the BEST method to implement this requirement?
Establish permissions which specify user access at a granular level.
Activate a frequent password reset schedule across the company.
Install the latest antivirus software on all devices within the organization.
Place the database application on an isolated network segment.