A small clinic determines that implementing a full-scale data encryption solution for its legacy electronic health record (EHR) system is not reasonable due to prohibitive costs. Instead, they implement and document several alternative controls, including heightened physical security, strict user access policies, and enhanced activity monitoring. Which concept within the HIPAA Security Rule does this action BEST represent?