A company's web application is vulnerable to a type of attack where unauthorized commands are sent from a user that the web application trusts. Which of the following is the BEST mitigation technique to prevent this type of vulnerability?
Employ parameterized queries
Use anti-CSRF tokens
Implement strict input validation
Adopt a strong content security policy