10 MLE Security
MLE utilizes a number of methods to support good security practices. This includes enforcing runtime state isolation, system and object privileges, and providing monitoring options.
Topics
- System and Object Privileges Required for Working with JavaScript in MLE
 Depending on the project's requirements, different privileges can be granted to users and or roles, allowing them to interact with JavaScript in the database.
- Security Considerations for MLE
 Besides the use of account privileges, MLE employs several other methods to ensure a high level of security.
- JavaScript Security Best Practices
 Details concerning the best practices when using features of MLE with JavaScript are described.
- MLE Security Examples
 Example scenarios are used to demonstrate security features used by MLE. The examples use a varying degree of separation between MLE modules, environments, and the necessary grants to enable the utilized functionality.