Access to online data is generally restricted to only those who are identified, authenticated, and authorized.
There are three main ways:
–> Create, read, update, and delete (CRUD) settings
——–> Determine which objects a user can create, read, update, and delete
–> Field level security (FLS) settings
——-> Determine which fields a user can read and edit
–> Sharing Rules
———> Determine which records are visible to users