You can use row level security (RLS) to control user access by table row and by SQL operation. Coding a set of user-defined functions (UDFs) for a security constraint must be coordinated with the purpose and structure of the corresponding CONSTRAINT object.