Watch this video on YouTube
As a cloud architect, you are implementing a security mechanism that enables a program to operate within a segregated environment to evaluate its behavior without impacting the host system. Which security principle are you employing in this context?