The legal department has required that all traffic to and from a company’s cloud-based word processing and email system is logged. To meet this requirement, the Chief Information Security Officer (CISO) has implemented a next-generation firewall to perform inspection of the secure traffic and has decided to use a cloud- based log aggregation solution for all traffic that is logged. Which of the following presents a long-term risk to user privacy in this scenario?
A. Confidential or sensitive documents are inspected by the firewall before being logged
B. Latency when viewing videos and other online content may increase
C. Reports generated from the firewall will take longer to produce due to more information from inspected traffic
D. Stored logs may contain non-encrypted usernames and passwords for personal website