You are asked to design security policies based on team membership.
Which access control methodology should you use in this scenario?
A. non-discretionary access control
B. role-based access control
C. mandatory access control
D. discretionary access control