Access Control

Effective access control policies are implemented to manage user access to the system:

  • Role-Based Access Control (RBAC) system is adopted to control access to services and data based on user roles.

  • Strict access differentiation is applied between administrators and regular users to enhance system security.

  • Access logs for user accounts and data are recorded and monitored to detect and prevent unauthorized access.

Last updated