An organization's IT department wants to implement a security model responsible for verifying user identities, determining access rights, and monitoring activities within a system. Which concept is most appropriate for the department to implement? A) Honeypot B) Firewall C) Intrusion Detection System (IDS) D) Identity and Access Management (IAM)