Your company mandates strict adherence to internal security policies, which state that access to network resources must be precisely aligned with the responsibilities of each staff member. Following a recent audit, it was determined that this policy needs to be better enforced to mitigate the potential for insider threats. Which of the following approaches would BEST ensure that staff access to network resources is appropriately restricted?
Adopting role-based access control (RBAC) mechanisms
Regularly changing default passwords on network devices
Implementing WPA3 on the wireless network to secure transmissions
Enabling a host-based firewall on all company computers