In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?
Access to the hardware
Data encryption
Non-standard event logs
Compressed customer data
Submit