An organization has noticed that employees are accessing sensitive files unrelated to their responsibilities. The company wants to ensure that users can access only the data required for their tasks. Which of the following methods would BEST address this issue?
Implementing role-based access control (RBAC) allows the organization to assign permissions to users based on their job responsibilities. This ensures that employees have access only to the resources necessary for their tasks, reducing unauthorized access to sensitive files. Encrypting files protects data confidentiality but doesn't prevent authorized users from accessing data beyond their responsibilities. Enforcing multi-factor authentication strengthens login security but doesn't control access permissions. Applying network segmentation divides the network but doesn't directly manage user access to specific files.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is role-based access control (RBAC)?
Open an interactive chat with Bash
How does RBAC improve security in an organization?
Open an interactive chat with Bash
What are some potential challenges of implementing RBAC?