By the end of this chapter, you are able to secure your sensitive data using the XDS features. We learned how to design and develop XDS policies, constrained tables and views, primary tables, policy queries, set the security context, run SQL queries and learned how to debug XDS policies.
In the next chapter, we are going to learn the organizational model framework, the organization model scenarios and how to extend and secure the organizational model.