The large business that Jack works for has been using noncentralized logging for years. They have recently started to implement centralized logging, however, and as they reviewed logs, they discovered a breach that appeared to have involved a malicious insider.
How can Jack best ensure accountability for actions taken on systems in his environment?
a. Log review and require digital signatures for each log.
b. Require authentication for all actions taken and capture logs centrally.
c. Log the use of administrative credentials and encrypt log data in transit.
d. Require authorization and capture logs centrally.