This safeguards data from unauthorized access even from database administrators at your organization or at your cloud provider who may have direct usage of the system, but never need to perspective the fundamental data. Companies have to have processes in place to Restrict the areas where sensitive data is stored, but that can't occur if they do