Programmers, field technicians, process engineers, vendors, and others should use jump hosts for remote access to control system assets. What type of security controls should be dedicated to remote access?
A. None remote access is secure by default
B. Firewall restricting only the ports necessary for the jump host
C. Virtualized host with role-specific applications
D. Virtual private network providing confidentiality, integrity and two-factor authentication