ThorTeaches.com recently migrated its legacy iscc video

 ·  PT1H46M27S  ·  EN

cc video for thorTeaches.com recently migrated its legacy systems to a cloud-based infrastructure. As part of this transition, they are redesigning their access

Full Certification Question

ThorTeaches.com recently migrated its legacy systems to a cloud-based infrastructure. As part of this transition, they are redesigning their access control policy. The corporation has a large number of employees in various roles, with varying levels of responsibilities and system access needs. The CIO (Chief Information Officer) wants to ensure that employees have access to the resources necessary for their job roles but wants to prevent unnecessary access that could potentially lead to security vulnerabilities. Which approach should ThorTeaches.com adopt to ensure an effective, efficient, and secure implementation of role-based access control (RBAC) in their new system?