During a cloud migration, your team discovers that sensitive customer data traverses an unencrypted internal network segment between two trusted zones. Operations argues encryption would add latency to time-sensitive transactions. What is the BEST approach?
A. Accept the risk since both zones are internally trusted and monitored
B. Conduct a risk assessment weighing data sensitivity against performance impact
C. Encrypt all internal traffic regardless of performance concerns
D. Implement network segmentation to isolate the sensitive data path