• A Database logging
  • B Extensible Data Security (XDS) policies
  • C Segregation of duties
  • D Role-based security