- Integrates with Lake Formation to enforce row-level security
- Encrypts data in the Data Catalog using KMS
- Uses IAM-based policies to restrict access to databases and tables
- Relies on S3 bucket policies to control data access