Your company has recently received several complaints where cloud service users reported suspicious activities in their account. The network security team in your company suspects the accounts were victims of session hijacking attacks. Which network layer security controls will prevent attacks such as session hijacking?