You are an information system auditor of HDA Inc. You are currently conducting an audit and your focus is on evaluating controls to safeguard the confidentiality and integrity of data stored without encryption on virtual machines. In this context, among the given options, what would be the most efficient and powerful control to achieve this objective?