You are welcome @Rama_s.
That last question, I am not sure how to answer it, since it looks quite general.
Only with that, I would say that it depends basically on the security policies within your company. How do you want to secure data and the processes? Which are the requirements? All of this, is what is called the Security Model. Once you get this, you can go to the authorizations matrix and the implementations on each system such as on the metadata, databases, filesystem,, etc.
If you feel a bit lost with this task, I would strongly recommend you to get a SAS consultant or partner to investigate your requirements and advise you with the process to define and implement proper security on your data.
... View more