What does the Role-Based Access Control (RBAC) method define?
What equipment is needed to perform
How information is accessed within a system
What actions the user can or cannot do
How to apply the security labels in a system
Submit