A system requires administrators to be logged in as the “root” in order to make administrator changes. Which of the following controls BEST mitigates the risk associated with this scenario?
A. Require that all administrators keep a log book of times and justification for accessing root
B. Encrypt all users home directories using file-level encryption
C. Implement a more restrictive password rotation policy for the shared root account
D. Force administrator to log in with individual accounts and switch to root
E. Add the administrator to the local group