Sara is the network manager of an investment firm. She has decided to improve the physical security of the storage devices attached to her network. Which strategy would achieve her objectives?