Zero Trust
Externalized authorization
Policy Based Access Control
Attribute Based Access Control (ABAC)
Dynamic Data Masking
Fine Grained Authorization
ALFA
Dynamic Authorization
Policy-based Access Control
runtime dynamic authorization
Access Control
Compliance
Identity-first security