...
The configuration is based on managing Custom Field Permission Schemes, thanks to which you can administer who to add the selected permissions to.
Full security of your Custom Fields
With Custom Fields, all data access methods are secured. No one can fetch your data using API or exports.