A global enterprise uses shared network infrastructure to support multiple business units with different regulatory obligations. During an investigation, encrypted internal traffic prevents determining which unit originated a noncompliant data transfer. Network design intentionally avoided segmentation to preserve agility.
What is the MOST appropriate architectural control to introduce FIRST?
A. Decrypt internal traffic at centralized inspection points
B. Implement logical network zoning aligned to business and regulatory boundaries
C. Increase application level logging to compensate for network opacity
D. Require all business units to use separate encryption keys