Your company is implementing a new security policy to enhance the security posture of the networking environment. Which practice would BEST ensure that employees have only the necessary access to fulfill their job responsibilities?
Conducting regular security risk assessments of network resources
Enforcing password complexity requirements on all user accounts
Enforcing role-based access control policies
Requiring multifactor authentication for all user logins