The appropriate security control for the scenario described is:
B. Implement robust input validation mechanisms to validate all incoming data.
This approach helps ensure that all incoming data is properly checked for correctness and appropriateness before it is processed or stored, which helps prevent the submission of malformed or malicious data that could lead to vulnerabilities such as SQL injection or other types of attacks that could expose sensitive information. Implementing robust input validation is a critical step in enhancing application security without significantly impacting usability.