This objective focuses on verifying technical enforcement of access limitations. You must demonstrate that your system configurations reflect your role-based policies and actively restrict users to only the actions and functions they’re authorized to perform.