An organization's IT department wants to implement a security model responsible for verifying user identities, determining access rights, and monitoring activities within a system. Which concept is most appropriate for the department to implement?
A) Honeypot
B) Firewall
C) Intrusion Detection System (IDS)
D) Identity and Access Management (IAM)