Analyze why user security groups and role definitions are essential to maintain the integrity of the database