A regulated organization designs a system where business users submit high value transactions through an application, while a separate service validates and commits them. Auditors later find administrators could bypass the application and update records directly in the database. Management wants assurance this cannot occur again.
What is the MOST appropriate architectural control to implement NEXT?
A. Stronger privileged user authentication and session recording
B. Mandatory access control enforced at the database layer
C. Constrained interfaces with enforced well formed transactions
D. Increased database activity monitoring and alerting