Provisioning key database roles is not a secondary task. It is the spine of security, access control, and operational stability. Every connection, every query runs under a role. Every role defines what can be read, written, or destroyed.
Start with an inventory. Identify all roles in the database: administrator, developer,