An organization's it department seeks to enhance its security framework with a system that verifies user identities and determines access rights, continuously monitors user activities, and dynamically applies security policies based on these factors. which concept is most appropriate for the department to implement to achieve this integrated approach?
O Zero trust
O AAA
O RBAC
O Policy engine