A company is overhauling its network security measures to adhere to best practices. As part of this initiative, you are directed to modify user permissions to enhance defenses against potential breaches. What approach should you take to align with the new security guidelines?
Enabling personnel to self-grant permissions when faced with access restrictions
Consolidating high-level privileges into a shared management account for convenience
Implementing role-based access control (RBAC) to define user permissions
Providing all staff with equivalent comprehensive privileges to streamline operations