Implementing which of the following controls would BEST reduce the impact of a vulnerability that has been exploited?