A security analyst wishes to implement a system that enforces access decisions to ensure that the privileges granted to an individual are appropriate for their role within the organization. Which component is critical for enforcing these access control decisions?
a) Firewall
b) Encryption
c) Access control list
d) Identity management