A tech company plans to launch a new application on a cloud platform to cater to its growing customer base. The lead security analyst examines potential vulnerabilities to ensure the application remains secure after deployment. The analyst focuses on potential weak points within the application's design and the cloud platform's infrastructure. Considering vulnerabilities associated with applications and cloud platforms, which of the following issues poses the highest risk related to unauthorized data access in cloud - hosted applications?
a. Inefficiently allocated cloud resources
b. Misconfigured cloud storage access controls
c. Absence of multifactor authentication (MFA) for application users
d. Disabled logging features within the application