A company has just deployed a centralized event log storage system. Which of the following can be used to ensure the integrity of the logs after they are collected?
A. Write-once drives
B. Database encryption
C. Continuous monitoring
D. Role-based access controls