Your data science team trains ML models using distributed GPU clusters across three cloud regions. The security team discovers that training data and model parameters traverse the corporate WAN unencrypted alongside general business traffic.
What should the network security architect recommend FIRST?
A. Encrypt all WAN traffic using a site-to-site VPN between the three cloud regions
B. Implement micro-segmentation to isolate AI training environments from enterprise traffic
C. Deploy a CASB to monitor and control data movement between cloud regions
D. Migrate all training workloads to a single region to eliminate cross-region data transit