Row-Level Security (RLS) is the database feature that decides who sees what, row by row. It lives inside your database, not in the app layer. It enforces data access rules at the lowest level possible, so no matter how the query comes in, the wrong eyes never see the wrong rows.
Manpages make this clear. They describe how to define policies, attach them to tables, and let the database handle enforcement. You can read them like a blueprint: set the policy name, define a USING clause to decide which rows are visible, define a WITH CHECK clause to control which rows can be inserted or updated. Once enabled, RLS applies to every SELECT, INSERT, UPDATE, and DELETE unless a superuser overrides it.
This is precision control. No scattered if-else logic in your application code. No blind trust in the client side. The database becomes the final judge of permissions. PostgreSQL manpages are especially specific. They show how to use CREATE POLICY, ALTER POLICY, and DROP POLICY, how to mix RLS with roles, and how to test your security to avoid silent leaks.