Ensure data integrity

The access method might provide locks, logging, backup and recovery, and transaction management features to ensure that source data matches virtual data.