What is an appropriate countermeasure to an escalation of privilege attack?
A) Regularly updating and patching software
B) Implementing strong authentication mechanisms
C) Monitoring and logging user activities
D) Least privilege principle and proper access controls