A cybersecurity analyst is working for a university that is conducting a big data medical research project. The analyst is concerned about the possibility of an inadvertent release of PHI data. Which of the following strategies should be used to prevent this?
1) Utilize a SaaS model to process the PHI data instead of an on-premise solution
2) Utilize formal methods of verification against the application processing the PHI
3) Use DevSecOps to build the application that processes the PHI
4) Conduct tokenization of the PHI data before ingesting it into the big data application