Explanation: An access control list (ACL) is a security tool that will ensure authorized data is sent to the application when implementing a cloud-based application. An ACL is a list of rules or policies that specify which users, groups, roles, or processes are allowed or denied access to a resource, such as a file, folder, network, or application. An ACL can also define the type and level of access that is granted or denied, such as read, write, execute, or delete. An ACL can help to protect the confidentiality, integrity, and availability of the data and the application in the cloud environment, by preventing unauthorized access, modification, or deletion. An ACL can also help to enforce the principle of least privilege, by granting only the minimum access required for the legitimate purpose. A host-based intrusion prevention system (HIPS) is a security tool that monitors and blocks malicious or anomalous activities on a host, such as a server, workstation, or device. A HIPS can help to protect the host from attacks, such as malware, exploits, or unauthorized changes, but it does not ensure authorized data is sent to the application. A file integrity monitoring (FIM) tool is a security tool that monitors and detects changes to files or directories, such as creation, deletion, modification, or renaming. A FIM tool can help to protect the integrity and availability of the files or directories, by alerting or reporting on unauthorized or unexpected changes, but it does not ensure authorized data is sent to the application. A data loss prevention (DLP) tool is a security tool that monitors and prevents the leakage or exfiltration of sensitive or confidential data, such as personal information, intellectual property, or trade secrets. A DLP tool can help to protect the confidentiality and integrity of the data, by blocking or encrypting the data before it is transferred, copied, printed, or emailed, but it does not ensure authorized data is sent to the application. References: Official (ISC)2 CISSP CBK Reference, Fifth Edition, Domain 5, Identity and Access Management, page 513. CISSP All-in-One Exam Guide, Eighth Edition, Chapter 5, Identity and Access Management, page 470.