Your company is implementing a new security policy to enhance the security posture of the networking environment. Which practice would BEST ensure that employees have only the necessary access to fulfill their job responsibilities?
Enforcing role-based access control policies
Enforcing password complexity requirements on all user accounts
Conducting regular security risk assessments of network resources
Requiring multifactor authentication for all user logins