When granting access to systems/resources, do you use RBAC model (Role-Based Access Control)?

Yes, and we follow a least privilege access model.