An organization is implementing new security policies to improve network security. As part of these policies, the network administrator has been instructed to restrict user access to network resources based on users' job roles. Which of the following security policies is the administrator enforcing?
Role-based access control policy (RBAC)
Password policy
Remote access policy
Onboarding and offboarding policy