The basic rule of protecting data is authorizing access to data only to selected staff members of an organization who are working on that data. This is done to ensure that in the case of data leakage, it would be easy to figure out who caused the leakage. For complete security, identity and privileges need to be managed properly. This can be achieved by teaming up your Access Security Broker with Identity Management.