How is the permission hierarchy structured?