Watch this video on YouTube
What are some common attributes used in Attribute-Based Access Control (ABAC) policies?