• Data encryption and masking
  • Role-based access control
  • Compliance considerations