If a security was not part of the development of a database, how is it usually handled?
Through cell suppression
By a trusted backend
By a trusted front-end
By views