In this chapter, we will cover the following recipes:
- Building cumulative security roles
- Configuring business unit hierarchies
- Configuring access based on hierarchical positions
- Configuring and assigning field-level security
- Setting up teams and sharing
- Setting up Access Teams
- Encrypting data at rest to meet the FIPS 140-2 standard
- Managing your Dynamics 365 online SQL TDE encryption key