A company's web application is vulnerable to a type of attack where unauthorized commands are sent from a user that the web application trusts. Which of the following is the BEST mitigation technique to prevent this type of vulnerability?
Employ parameterized queries
Adopt a strong content security policy
Implement strict input validation
Use anti-CSRF tokens