A cloud provider is evaluating an insider threat. A resource from the company operations team has access to the servers’ virtual disks. This poses a risk that someone could copy and move the virtual server image and have access to the data. Which of the following solutions would help mitigate this problem?
A. Tokenization
B. Encryption
C. Virtual firewall
D. Hashing