A systems administrator is trying to secure a critical system. The administrator has placed the system behind a firewall, enabled strong authentication, and required all administrators of this system to attend mandatory training. Which of the following BEST describes the control being implemented?
A. Audit remediation
B. Defense in depth
C. Access control
D. Multifactor authentication