With RBAC, roles are:

A.
Based on labels.
B.
All equal
C.
Hierarchical
D.
Based on flows.
Explanation:
With RBAC, security is managed at a level that corresponds closely to the
organization’s structure. Each user is assigned one or more roles, and each role is
assigned one or more privileges that are permitted to users in that role. Roles can be
hierarchical.