Recap In the Authorization section of this tutorial you have learned about the following: The different types of database assets protected by the InterSystems security system. Using InterSystems security resources to protect database assets . Using InterSystems IRIS's role-based security system to assign privileges to users. Using the $SYSTEM.Security.Check method to protect code blocks from unauthorized access.