In order to minimize the risk of abusing access controls, which of the following is a good example of granular access control implementation?
System administrator access
Least privilege principle
Guest account access
Discretionary access control (DAC)
Submit