You are an administrator for a Power Platform environment that employs all features of the security model.
You are adding users to the environment. Users must be restricted to data in their own team.
Before a user can be assigned a security role, what must they be assigned to?
A) A business unit
B) An access team
C) A security group
D) A field security profile