Access Control
Effective access control policies are implemented to manage user access to the system:
Role-Based Access Control (RBAC) system is adopted to control access to services and data based on user roles.
Strict access differentiation is applied between administrators and regular users to enhance system security.
Access logs for user accounts and data are recorded and monitored to detect and prevent unauthorized access.
Last updated