ThorTeaches.com has recently experienced a data breach, and management is concerned about the security of their sensitive information. They have asked you to recommend ways to protect this information going forward. Which of the following is a method for ensuring that only authorized users can access sensitive information?