For each database containing cardholder data:
i. Identify applications with access to the database.
ii. Describe the implemented methods for ensuring that application IDs can only be used by the applications, and not by:
o Individual users
o Other processes
iii. Describe how the methods were observed to ensure that application IDs cannot be used by:
o Individual users
o Other processes