Watch this video on YouTube
Sarah, a database administrator, is working on a critical system. Which approach should her company use to minimize security risks related to her access privileges?