A security administrator is hardening a TrustedSolaris server that processes sensitive data. The data owner has established the following security requirements:
- The data is for internal consumption only and shall not be distributed to outside individuals
- The systems administrator should not have access to the data processed by the server
- The integrity of the kernel image is maintained
Which of the following host-based security controls BEST enforce the data owner’s requirements? (Choose three.)
A. SELinux
B. DLP
C. HIDS
D. Host-based firewall
E. Measured boot
F. Data encryption
G. Watermarking
Correct Answer: CEF