Which method correctly exemplifies the principle of assigning permissions based on job functions within a common cloud provider's environment?
Distributing individual authentication keys directly correlated to user responsibilities.
Assigning managed roles with predefined policies to entities based on their operational needs.
Configuring network security settings to align with departmental structures.
Implementing a firewall solution that adapts its rules to the user's job title.