A financial institution wants to segment its internal network to reduce the risk of sensitive financial data being accessed by unauthorized employees. The segmentation must allow for monitoring and inspection of traffic between the segments. Which of the following would best meet these requirements?
A. Implement virtual LANs (VLANs) without firewall rules between them.
B. Deploy firewalls with strict access control lists (ACLs) between network segments.
C. Use network address translation (NAT) to isolate the segments.
D. Rely on intrusion detection systems (IDS) to monitor segment traffic.