When using zones, consider the following security questions:
- Who can access the zone?
- Do some users need access to all zones?
- What privileges do zone users need to access in a zone?
- How do the GRANT CONNECT THROUGH limitations affect users?
- Which tables and views are available for zone users?