Mechanisms exist to enforce Logical Access Control (LAC) permissions that conform to the principle of “least privilege.”
Does the organization enforce Logical Access Control (LAC) permissions that conform to the principle of “least privilege?”