Roles and permissions are typically implemented through an access control system. This system uses role-based access control (RBAC) to assign permissions to users. RBAC ensures that users can perform only those actions that are necessary for their role, thereby reducing the risk of data breaches.