Your security policy should be based on the following considerations:
Determine your security needs to balance the need for secure data against user needs
for quick and efficient data access.
Review Teradata Database security features to meet your needs.
Develop a policy that includes both system-enforced and personnel-enforced features.