How Do You Ensure That Any Access Security is Propagated to Any Reporting Layer?

Authentication and authorization happens on a backend API layer in real-time, and changes are propagated in real-time.