A company’s Chief Information Officer (CIO) wants to manage PII by delegating access to sensitive files to the human resources department. The cloud engineer is tasked with selecting and implementing an appropriate technique to achieve the stated objective.
Which of the following control methods would be BEST for the cloud engineer to implement?
A . Create a group, add users to the group, and apply the appropriate AC
C . Restrict the access to originate from the home office only.
D . Create a shared account for users in the human resources department.
E . Implement multifactor authentication for users in the human resources department.