diff --git a/src/query/plan/operator.cpp b/src/query/plan/operator.cpp
index 13858f3cf..ea87bc411 100644
--- a/src/query/plan/operator.cpp
+++ b/src/query/plan/operator.cpp
@@ -243,8 +243,7 @@ bool CreateNode::CreateNodeCursor::Pull(Frame &frame, ExecutionContext &context)
   if (context.auth_checker &&
       !context.auth_checker->Accept(*context.db_accessor, self_.node_info_.labels,
                                     memgraph::query::AuthQuery::FineGrainedPrivilege::CREATE_DELETE)) {
-    spdlog::info("Vertex will not be created due to not having enough permission!");
-    return false;
+    throw QueryRuntimeException("Vertex not created due to not having enough permission!");
   }
 
   if (input_cursor_->Pull(frame, context)) {
@@ -338,8 +337,7 @@ bool CreateExpand::CreateExpandCursor::Pull(Frame &frame, ExecutionContext &cont
       !(context.auth_checker->Accept(*context.db_accessor, self_.edge_info_.edge_type,
                                      memgraph::query::AuthQuery::FineGrainedPrivilege::CREATE_DELETE) &&
         context.auth_checker->Accept(*context.db_accessor, self_.node_info_.labels, fine_grained_permission))) {
-    spdlog::info("Edge will not be created due to not having enough permission!");
-    return false;
+    throw QueryRuntimeException("Edge not created due to not having enough permission!");
   }
   // get the origin vertex
   TypedValue &vertex_value = frame[self_.input_symbol_];
@@ -2341,8 +2339,7 @@ bool Delete::DeleteCursor::Pull(Frame &frame, ExecutionContext &context) {
                                          query::AuthQuery::FineGrainedPrivilege::UPDATE) &&
             context.auth_checker->Accept(*context.db_accessor, ea.From(), storage::View::NEW,
                                          query::AuthQuery::FineGrainedPrivilege::UPDATE))) {
-        spdlog::info("Edge will not be deleted due to not having enough permission!");
-        continue;
+        throw QueryRuntimeException("Edge not deleted due to not having enough permission!");
       }
       auto maybe_value = dba.RemoveEdge(&ea);
       if (maybe_value.HasError()) {
@@ -2372,8 +2369,7 @@ bool Delete::DeleteCursor::Pull(Frame &frame, ExecutionContext &context) {
         if (context.auth_checker &&
             !context.auth_checker->Accept(*context.db_accessor, va, storage::View::NEW,
                                           query::AuthQuery::FineGrainedPrivilege::CREATE_DELETE)) {
-          spdlog::info("Vertex will not be deleted due to not having enough permission!");
-          break;
+          throw QueryRuntimeException("Vertex not deleted due to not having enough permission!");
         }
         if (self_.detach_) {
           auto res = dba.DetachRemoveVertex(&va);
@@ -2481,8 +2477,7 @@ bool SetProperty::SetPropertyCursor::Pull(Frame &frame, ExecutionContext &contex
       if (context.auth_checker &&
           !context.auth_checker->Accept(*context.db_accessor, lhs.ValueVertex(), storage::View::NEW,
                                         memgraph::query::AuthQuery::FineGrainedPrivilege::UPDATE)) {
-        spdlog::info("Vertex property will not be set due to not having enough permission.");
-        break;
+        throw QueryRuntimeException("Vertex property not set due to not having enough permission!");
       }
 
       auto old_value = PropsSetChecked(&lhs.ValueVertex(), self_.property_, rhs);
@@ -2498,8 +2493,7 @@ bool SetProperty::SetPropertyCursor::Pull(Frame &frame, ExecutionContext &contex
       if (context.auth_checker &&
           !context.auth_checker->Accept(*context.db_accessor, lhs.ValueEdge(),
                                         memgraph::query::AuthQuery::FineGrainedPrivilege::UPDATE)) {
-        spdlog::info("Edge property will not be set due to not having enough permission.");
-        break;
+        throw QueryRuntimeException("Edge property not set due to not having enough permission!");
       }
 
       auto old_value = PropsSetChecked(&lhs.ValueEdge(), self_.property_, rhs);
@@ -2697,8 +2691,7 @@ bool SetProperties::SetPropertiesCursor::Pull(Frame &frame, ExecutionContext &co
       if (context.auth_checker &&
           !context.auth_checker->Accept(*context.db_accessor, lhs.ValueVertex(), storage::View::NEW,
                                         memgraph::query::AuthQuery::FineGrainedPrivilege::UPDATE)) {
-        spdlog::info("Vertex properties will not be set due to not having enough permission.");
-        break;
+        throw QueryRuntimeException("Vertex properties not set due to not having enough permission!");
       }
 
       SetPropertiesOnRecord(&lhs.ValueVertex(), rhs, self_.op_, &context);
@@ -2707,8 +2700,7 @@ bool SetProperties::SetPropertiesCursor::Pull(Frame &frame, ExecutionContext &co
       if (context.auth_checker &&
           !context.auth_checker->Accept(*context.db_accessor, lhs.ValueEdge(),
                                         memgraph::query::AuthQuery::FineGrainedPrivilege::UPDATE)) {
-        spdlog::info("Edge properties will not be set due to not having enough permission!");
-        break;
+        throw QueryRuntimeException("Edge properties not set due to not having enough permission!");
       }
 
       SetPropertiesOnRecord(&lhs.ValueEdge(), rhs, self_.op_, &context);
@@ -2840,8 +2832,7 @@ bool RemoveProperty::RemovePropertyCursor::Pull(Frame &frame, ExecutionContext &
       if (context.auth_checker &&
           !context.auth_checker->Accept(*context.db_accessor, lhs.ValueVertex(), storage::View::NEW,
                                         memgraph::query::AuthQuery::FineGrainedPrivilege::UPDATE)) {
-        spdlog::info("Vertex property will not be removed due to not having enough permission.");
-        break;
+        throw QueryRuntimeException("Vertex property not removed due to not having enough permission!");
       }
 
       remove_prop(&lhs.ValueVertex());
@@ -2850,8 +2841,7 @@ bool RemoveProperty::RemovePropertyCursor::Pull(Frame &frame, ExecutionContext &
       if (context.auth_checker &&
           !context.auth_checker->Accept(*context.db_accessor, lhs.ValueEdge(),
                                         memgraph::query::AuthQuery::FineGrainedPrivilege::UPDATE)) {
-        spdlog::info("Edge property will not be removed due to not having enough permission.");
-        break;
+        throw QueryRuntimeException("Edge property not removed due to not having enough permission!");
       }
 
       remove_prop(&lhs.ValueEdge());
diff --git a/tests/e2e/fine_grained_access/create_delete_filtering_tests.py b/tests/e2e/fine_grained_access/create_delete_filtering_tests.py
index 160cf0fdd..3e0e5118e 100644
--- a/tests/e2e/fine_grained_access/create_delete_filtering_tests.py
+++ b/tests/e2e/fine_grained_access/create_delete_filtering_tests.py
@@ -9,9 +9,12 @@
 # by the Apache License, Version 2.0, included in the file
 # licenses/APL.txt.
 
-import common
-import sys
 import pytest
+import sys
+
+from mgclient import DatabaseError
+
+import common
 
 
 def test_create_node_all_labels_granted():
@@ -29,9 +32,9 @@ def test_create_node_all_labels_denied():
     user_connnection = common.connect(username="user", password="test")
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON LABELS * TO user;")
-    results = common.execute_and_fetch_all(user_connnection.cursor(), "CREATE (n:label1) RETURN n;")
 
-    assert len(results) == 0
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(user_connnection.cursor(), "CREATE (n:label1) RETURN n;")
 
 
 def test_create_node_specific_label_granted():
@@ -49,9 +52,9 @@ def test_create_node_specific_label_denied():
     user_connnection = common.connect(username="user", password="test")
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON LABELS :label1 TO user;")
-    results = common.execute_and_fetch_all(user_connnection.cursor(), "CREATE (n:label1) RETURN n;")
 
-    assert len(results) == 0
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(user_connnection.cursor(), "CREATE (n:label1) RETURN n;")
 
 
 def test_delete_node_all_labels_granted():
@@ -71,11 +74,9 @@ def test_delete_node_all_labels_denied():
     user_connnection = common.connect(username="user", password="test")
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON LABELS * TO user;")
-    common.execute_and_fetch_all(user_connnection.cursor(), "MATCH (n:test_delete) DELETE n")
 
-    results = common.execute_and_fetch_all(admin_connection.cursor(), "MATCH (n:test_delete) RETURN n;")
-
-    assert len(results) == 1
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(user_connnection.cursor(), "MATCH (n:test_delete) DELETE n")
 
 
 def test_delete_node_specific_label_granted():
@@ -95,11 +96,9 @@ def test_delete_node_specific_label_denied():
     user_connnection = common.connect(username="user", password="test")
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON LABELS :test_delete TO user;")
-    common.execute_and_fetch_all(user_connnection.cursor(), "MATCH (n:test_delete) DELETE n;")
 
-    results = common.execute_and_fetch_all(admin_connection.cursor(), "MATCH (n:test_delete) RETURN n;")
-
-    assert len(results) == 1
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(user_connnection.cursor(), "MATCH (n:test_delete) DELETE n;")
 
 
 def test_create_edge_all_labels_all_edge_types_granted():
@@ -110,7 +109,8 @@ def test_create_edge_all_labels_all_edge_types_granted():
     common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON EDGE_TYPES * TO user;")
 
     results = common.execute_and_fetch_all(
-        user_connnection.cursor(), "CREATE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;"
+        user_connnection.cursor(),
+        "CREATE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;",
     )
 
     assert len(results) == 1
@@ -122,11 +122,12 @@ def test_create_edge_all_labels_all_edge_types_denied():
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON LABELS * TO user;")
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON EDGE_TYPES * TO user;")
-    results = common.execute_and_fetch_all(
-        user_connnection.cursor(), "CREATE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;"
-    )
 
-    assert len(results) == 0
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(
+            user_connnection.cursor(),
+            "CREATE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;",
+        )
 
 
 def test_create_edge_all_labels_denied_all_edge_types_granted():
@@ -135,11 +136,12 @@ def test_create_edge_all_labels_denied_all_edge_types_granted():
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON LABELS * TO user;")
     common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON EDGE_TYPES * TO user;")
-    results = common.execute_and_fetch_all(
-        user_connnection.cursor(), "CREATE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;"
-    )
 
-    assert len(results) == 0
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(
+            user_connnection.cursor(),
+            "CREATE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;",
+        )
 
 
 def test_create_edge_all_labels_granted_all_edge_types_denied():
@@ -148,11 +150,12 @@ def test_create_edge_all_labels_granted_all_edge_types_denied():
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON LABELS * TO user;")
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON EDGE_TYPES * TO user;")
-    results = common.execute_and_fetch_all(
-        user_connnection.cursor(), "CREATE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;"
-    )
 
-    assert len(results) == 0
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(
+            user_connnection.cursor(),
+            "CREATE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;",
+        )
 
 
 def test_create_edge_all_labels_granted_specific_edge_types_denied():
@@ -160,12 +163,16 @@ def test_create_edge_all_labels_granted_specific_edge_types_denied():
     user_connnection = common.connect(username="user", password="test")
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON LABELS * TO user;")
-    common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON EDGE_TYPES :edge_type TO user;")
-    results = common.execute_and_fetch_all(
-        user_connnection.cursor(), "CREATE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;"
+    common.execute_and_fetch_all(
+        admin_connection.cursor(),
+        "DENY CREATE_DELETE ON EDGE_TYPES :edge_type TO user;",
     )
 
-    assert len(results) == 0
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(
+            user_connnection.cursor(),
+            "CREATE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;",
+        )
 
 
 def test_create_edge_first_node_label_granted():
@@ -174,13 +181,16 @@ def test_create_edge_first_node_label_granted():
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON LABELS :label1 TO user;")
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON LABELS :label2 TO user;")
-    common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON EDGE_TYPES :edge_type TO user;")
-
-    results = common.execute_and_fetch_all(
-        user_connnection.cursor(), "CREATE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;"
+    common.execute_and_fetch_all(
+        admin_connection.cursor(),
+        "GRANT CREATE_DELETE ON EDGE_TYPES :edge_type TO user;",
     )
 
-    assert len(results) == 0
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(
+            user_connnection.cursor(),
+            "CREATE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;",
+        )
 
 
 def test_create_edge_second_node_label_granted():
@@ -189,13 +199,16 @@ def test_create_edge_second_node_label_granted():
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON LABELS :label2 TO user;")
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON LABELS :label1 TO user;")
-    common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON EDGE_TYPES :edge_type TO user;")
-
-    results = common.execute_and_fetch_all(
-        user_connnection.cursor(), "CREATE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;"
+    common.execute_and_fetch_all(
+        admin_connection.cursor(),
+        "GRANT CREATE_DELETE ON EDGE_TYPES :edge_type TO user;",
     )
 
-    assert len(results) == 0
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(
+            user_connnection.cursor(),
+            "CREATE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;",
+        )
 
 
 def test_delete_edge_all_labels_denied_all_edge_types_granted():
@@ -204,15 +217,12 @@ def test_delete_edge_all_labels_denied_all_edge_types_granted():
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY UPDATE ON LABELS * TO user;")
     common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON EDGE_TYPES * TO user;")
-    common.execute_and_fetch_all(
-        user_connnection.cursor(), "MATCH (n:test_delete_1)-[r:edge_type_delete]->(m:test_delete_2) DELETE r"
-    )
 
-    results = common.execute_and_fetch_all(
-        admin_connection.cursor(), "MATCH (n:test_delete_1)-[r:edge_type_delete]->(m:test_delete_2) RETURN n,r,m;"
-    )
-
-    assert len(results) == 1
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(
+            user_connnection.cursor(),
+            "MATCH (n:test_delete_1)-[r:edge_type_delete]->(m:test_delete_2) DELETE r",
+        )
 
 
 def test_delete_edge_all_labels_granted_all_edge_types_denied():
@@ -221,15 +231,12 @@ def test_delete_edge_all_labels_granted_all_edge_types_denied():
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON LABELS * TO user;")
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON EDGE_TYPES * TO user;")
-    common.execute_and_fetch_all(
-        user_connnection.cursor(), "MATCH (n:test_delete_1)-[r:edge_type_delete]->(m:test_delete_2) DELETE r"
-    )
 
-    results = common.execute_and_fetch_all(
-        admin_connection.cursor(), "MATCH (n:test_delete_1)-[r:edge_type_delete]->(m:test_delete_2) RETURN n,r,m;"
-    )
-
-    assert len(results) == 1
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(
+            user_connnection.cursor(),
+            "MATCH (n:test_delete_1)-[r:edge_type_delete]->(m:test_delete_2) DELETE r",
+        )
 
 
 def test_delete_edge_all_labels_granted_specific_edge_types_denied():
@@ -238,17 +245,15 @@ def test_delete_edge_all_labels_granted_specific_edge_types_denied():
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON LABELS * TO user;")
     common.execute_and_fetch_all(
-        admin_connection.cursor(), "DENY CREATE_DELETE ON EDGE_TYPES :edge_type_delete TO user;"
-    )
-    common.execute_and_fetch_all(
-        user_connnection.cursor(), "MATCH (n:test_delete_1)-[r:edge_type_delete]->(m:test_delete_2) DELETE r"
+        admin_connection.cursor(),
+        "DENY CREATE_DELETE ON EDGE_TYPES :edge_type_delete TO user;",
     )
 
-    results = common.execute_and_fetch_all(
-        admin_connection.cursor(), "MATCH (n:test_delete_1)-[r:edge_type_delete]->(m:test_delete_2) RETURN n,r,m;"
-    )
-
-    assert len(results) == 1
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(
+            user_connnection.cursor(),
+            "MATCH (n:test_delete_1)-[r:edge_type_delete]->(m:test_delete_2) DELETE r",
+        )
 
 
 def test_delete_edge_first_node_label_granted():
@@ -258,17 +263,15 @@ def test_delete_edge_first_node_label_granted():
     common.execute_and_fetch_all(admin_connection.cursor(), "GRANT UPDATE ON LABELS :test_delete_1 TO user;")
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY UPDATE ON LABELS :test_delete_2 TO user;")
     common.execute_and_fetch_all(
-        admin_connection.cursor(), "GRANT CREATE_DELETE ON EDGE_TYPES :edge_type_delete TO user;"
-    )
-    common.execute_and_fetch_all(
-        user_connnection.cursor(), "MATCH (n:test_delete_1)-[r:edge_type_delete]->(m:test_delete_2) DELETE r"
+        admin_connection.cursor(),
+        "GRANT CREATE_DELETE ON EDGE_TYPES :edge_type_delete TO user;",
     )
 
-    results = common.execute_and_fetch_all(
-        admin_connection.cursor(), "MATCH (n:test_delete_1)-[r:edge_type_delete]->(m:test_delete_2) RETURN n,r,m;"
-    )
-
-    assert len(results) == 1
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(
+            user_connnection.cursor(),
+            "MATCH (n:test_delete_1)-[r:edge_type_delete]->(m:test_delete_2) DELETE r",
+        )
 
 
 def test_delete_edge_second_node_label_granted():
@@ -278,36 +281,38 @@ def test_delete_edge_second_node_label_granted():
     common.execute_and_fetch_all(admin_connection.cursor(), "GRANT UPDATE ON LABELS :test_delete_2 TO user;")
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY UPDATE ON LABELS :test_delete_1 TO user;")
     common.execute_and_fetch_all(
-        admin_connection.cursor(), "GRANT CREATE_DELETE ON EDGE_TYPES :edge_type_delete TO user;"
-    )
-    common.execute_and_fetch_all(
-        user_connnection.cursor(), "MATCH (n:test_delete_1)-[r:edge_type_delete]->(m:test_delete_2) DELETE r"
+        admin_connection.cursor(),
+        "GRANT CREATE_DELETE ON EDGE_TYPES :edge_type_delete TO user;",
     )
 
-    results = common.execute_and_fetch_all(
-        admin_connection.cursor(), "MATCH (n:test_delete_1)-[r:edge_type_delete]->(m:test_delete_2) RETURN n,r,m;"
-    )
-
-    assert len(results) == 1
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(
+            user_connnection.cursor(),
+            "MATCH (n:test_delete_1)-[r:edge_type_delete]->(m:test_delete_2) DELETE r",
+        )
 
 
 def test_delete_node_with_edge_label_denied():
     admin_connection = common.connect(username="admin", password="test")
     user_connnection = common.connect(username="user", password="test")
     common.reset_and_prepare(admin_connection.cursor())
-    common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON LABELS :test_delete_1 TO user;")
-    common.execute_and_fetch_all(user_connnection.cursor(), "MATCH (n) DETACH DELETE n;")
+    common.execute_and_fetch_all(
+        admin_connection.cursor(),
+        "DENY CREATE_DELETE ON LABELS :test_delete_1 TO user;",
+    )
 
-    results = common.execute_and_fetch_all(admin_connection.cursor(), "MATCH (n:test_delete_1) RETURN n;")
-
-    assert len(results) == 1
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(user_connnection.cursor(), "MATCH (n) DETACH DELETE n;")
 
 
 def test_delete_node_with_edge_label_granted():
     admin_connection = common.connect(username="admin", password="test")
     user_connnection = common.connect(username="user", password="test")
     common.reset_and_prepare(admin_connection.cursor())
-    common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON LABELS :test_delete_1 TO user;")
+    common.execute_and_fetch_all(
+        admin_connection.cursor(),
+        "GRANT CREATE_DELETE ON LABELS :test_delete_1 TO user;",
+    )
 
     common.execute_and_fetch_all(user_connnection.cursor(), "MATCH (n) DETACH DELETE n;")
 
@@ -331,9 +336,9 @@ def test_merge_node_all_labels_denied():
     user_connnection = common.connect(username="user", password="test")
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON LABELS * TO user;")
-    results = common.execute_and_fetch_all(user_connnection.cursor(), "MERGE (n:label1) RETURN n;")
 
-    assert len(results) == 0
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(user_connnection.cursor(), "MERGE (n:label1) RETURN n;")
 
 
 def test_merge_node_specific_label_granted():
@@ -351,9 +356,9 @@ def test_merge_node_specific_label_denied():
     user_connnection = common.connect(username="user", password="test")
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON LABELS :label1 TO user;")
-    results = common.execute_and_fetch_all(user_connnection.cursor(), "MERGE (n:label1) RETURN n;")
 
-    assert len(results) == 0
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(user_connnection.cursor(), "MERGE (n:label1) RETURN n;")
 
 
 def test_merge_edge_all_labels_all_edge_types_granted():
@@ -363,7 +368,8 @@ def test_merge_edge_all_labels_all_edge_types_granted():
     common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON LABELS * TO user;")
     common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON EDGE_TYPES * TO user;")
     results = common.execute_and_fetch_all(
-        user_connnection.cursor(), "MERGE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;"
+        user_connnection.cursor(),
+        "MERGE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;",
     )
 
     assert len(results) == 1
@@ -375,11 +381,12 @@ def test_merge_edge_all_labels_all_edge_types_denied():
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON LABELS * TO user;")
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON EDGE_TYPES * TO user;")
-    results = common.execute_and_fetch_all(
-        user_connnection.cursor(), "MERGE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;"
-    )
 
-    assert len(results) == 0
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(
+            user_connnection.cursor(),
+            "MERGE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;",
+        )
 
 
 def test_merge_edge_all_labels_denied_all_edge_types_granted():
@@ -388,11 +395,12 @@ def test_merge_edge_all_labels_denied_all_edge_types_granted():
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON LABELS * TO user;")
     common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON EDGE_TYPES * TO user;")
-    results = common.execute_and_fetch_all(
-        user_connnection.cursor(), "MERGE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;"
-    )
 
-    assert len(results) == 0
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(
+            user_connnection.cursor(),
+            "MERGE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;",
+        )
 
 
 def test_merge_edge_all_labels_granted_all_edge_types_denied():
@@ -401,11 +409,12 @@ def test_merge_edge_all_labels_granted_all_edge_types_denied():
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON LABELS * TO user;")
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON EDGE_TYPES * TO user;")
-    results = common.execute_and_fetch_all(
-        user_connnection.cursor(), "MERGE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;"
-    )
 
-    assert len(results) == 0
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(
+            user_connnection.cursor(),
+            "MERGE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;",
+        )
 
 
 def test_merge_edge_all_labels_granted_specific_edge_types_denied():
@@ -413,12 +422,16 @@ def test_merge_edge_all_labels_granted_specific_edge_types_denied():
     user_connnection = common.connect(username="user", password="test")
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON LABELS * TO user;")
-    common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON EDGE_TYPES :edge_type TO user;")
-    results = common.execute_and_fetch_all(
-        user_connnection.cursor(), "MERGE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;"
+    common.execute_and_fetch_all(
+        admin_connection.cursor(),
+        "DENY CREATE_DELETE ON EDGE_TYPES :edge_type TO user;",
     )
 
-    assert len(results) == 0
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(
+            user_connnection.cursor(),
+            "MERGE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;",
+        )
 
 
 def test_merge_edge_first_node_label_granted():
@@ -427,13 +440,16 @@ def test_merge_edge_first_node_label_granted():
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON LABELS :label1 TO user;")
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON LABELS :label2 TO user;")
-    common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON EDGE_TYPES :edge_type TO user;")
-
-    results = common.execute_and_fetch_all(
-        user_connnection.cursor(), "MERGE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;"
+    common.execute_and_fetch_all(
+        admin_connection.cursor(),
+        "GRANT CREATE_DELETE ON EDGE_TYPES :edge_type TO user;",
     )
 
-    assert len(results) == 0
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(
+            user_connnection.cursor(),
+            "MERGE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;",
+        )
 
 
 def test_merge_edge_second_node_label_granted():
@@ -442,13 +458,16 @@ def test_merge_edge_second_node_label_granted():
     common.reset_and_prepare(admin_connection.cursor())
     common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON LABELS :label2 TO user;")
     common.execute_and_fetch_all(admin_connection.cursor(), "DENY CREATE_DELETE ON LABELS :label1 TO user;")
-    common.execute_and_fetch_all(admin_connection.cursor(), "GRANT CREATE_DELETE ON EDGE_TYPES :edge_type TO user;")
-
-    results = common.execute_and_fetch_all(
-        user_connnection.cursor(), "MERGE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;"
+    common.execute_and_fetch_all(
+        admin_connection.cursor(),
+        "GRANT CREATE_DELETE ON EDGE_TYPES :edge_type TO user;",
     )
 
-    assert len(results) == 0
+    with pytest.raises(DatabaseError):
+        common.execute_and_fetch_all(
+            user_connnection.cursor(),
+            "MERGE (n:label1)-[r:edge_type]->(m:label2) RETURN n,r,m;",
+        )
 
 
 if __name__ == "__main__":
diff --git a/tests/e2e/lba_procedures/update_permission_queries.py b/tests/e2e/lba_procedures/update_permission_queries.py
index 46b624279..6c96d9938 100644
--- a/tests/e2e/lba_procedures/update_permission_queries.py
+++ b/tests/e2e/lba_procedures/update_permission_queries.py
@@ -11,6 +11,9 @@
 
 import sys
 import pytest
+
+from mgclient import DatabaseError
+
 from common import connect, execute_and_fetch_all, reset_update_permissions
 
 update_property_query = "MATCH (n:update_label) SET n.prop = 2 RETURN n.prop;"
@@ -52,28 +55,14 @@ def test_can_not_update_node_when_given_deny():
 
     test_cursor = connect(username="user", password="test").cursor()
 
-    update_property_actual = execute_and_fetch_all(test_cursor, update_property_query)
-    update_properties_actual = execute_and_fetch_all(test_cursor, update_properties_query)
-    remove_property_actual = execute_and_fetch_all(test_cursor, remove_property_query)
+    with pytest.raises(DatabaseError):
+        execute_and_fetch_all(test_cursor, update_property_query)
 
-    assert update_property_actual[0][0] == 1
-    assert update_properties_actual[0][0] == 1
-    assert remove_property_actual[0][0] == 1
+    with pytest.raises(DatabaseError):
+        execute_and_fetch_all(test_cursor, update_properties_query)
 
-
-def test_can_not_update_node_when_given_nothing():
-    admin_cursor = connect(username="admin", password="test").cursor()
-    reset_update_permissions(admin_cursor)
-
-    test_cursor = connect(username="user", password="test").cursor()
-
-    update_property_actual = execute_and_fetch_all(test_cursor, update_property_query)
-    update_properties_actual = execute_and_fetch_all(test_cursor, update_properties_query)
-    remove_property_actual = execute_and_fetch_all(test_cursor, remove_property_query)
-
-    assert len(update_property_actual) == 0
-    assert len(update_properties_actual) == 0
-    assert len(remove_property_actual) == 0
+    with pytest.raises(DatabaseError):
+        execute_and_fetch_all(test_cursor, remove_property_query)
 
 
 def test_can_not_update_node_when_given_read():
@@ -83,13 +72,14 @@ def test_can_not_update_node_when_given_read():
 
     test_cursor = connect(username="user", password="test").cursor()
 
-    update_property_actual = execute_and_fetch_all(test_cursor, update_property_query)
-    update_properties_actual = execute_and_fetch_all(test_cursor, update_properties_query)
-    remove_property_actual = execute_and_fetch_all(test_cursor, remove_property_query)
+    with pytest.raises(DatabaseError):
+        execute_and_fetch_all(test_cursor, update_property_query)
 
-    assert update_property_actual[0][0] == 1
-    assert update_properties_actual[0][0] == 1
-    assert remove_property_actual[0][0] == 1
+    with pytest.raises(DatabaseError):
+        execute_and_fetch_all(test_cursor, update_properties_query)
+
+    with pytest.raises(DatabaseError):
+        execute_and_fetch_all(test_cursor, remove_property_query)
 
 
 def test_can_not_update_node_when_given_read_globally():
@@ -99,13 +89,14 @@ def test_can_not_update_node_when_given_read_globally():
 
     test_cursor = connect(username="user", password="test").cursor()
 
-    update_property_actual = execute_and_fetch_all(test_cursor, update_property_query)
-    update_properties_actual = execute_and_fetch_all(test_cursor, update_properties_query)
-    remove_property_actual = execute_and_fetch_all(test_cursor, remove_property_query)
+    with pytest.raises(DatabaseError):
+        execute_and_fetch_all(test_cursor, update_property_query)
 
-    assert update_property_actual[0][0] == 1
-    assert update_properties_actual[0][0] == 1
-    assert remove_property_actual[0][0] == 1
+    with pytest.raises(DatabaseError):
+        execute_and_fetch_all(test_cursor, update_properties_query)
+
+    with pytest.raises(DatabaseError):
+        execute_and_fetch_all(test_cursor, remove_property_query)
 
 
 def test_can_update_node_when_given_update_globally():
diff --git a/tests/unit/query_plan_create_set_remove_delete.cpp b/tests/unit/query_plan_create_set_remove_delete.cpp
index fcc57a807..5b559aa8c 100644
--- a/tests/unit/query_plan_create_set_remove_delete.cpp
+++ b/tests/unit/query_plan_create_set_remove_delete.cpp
@@ -114,7 +114,7 @@ TEST(QueryPlan, FineGrainedCreateNodeWithAttributes) {
     memgraph::auth::User user{"test"};
     user.fine_grained_access_handler().label_permissions().Deny("label1",
                                                                 memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    EXPECT_EQ(test_create(user), 0);
+    ASSERT_THROW(test_create(user), QueryRuntimeException);
   }
 }
 
@@ -212,8 +212,7 @@ TEST(QueryPlan, FineGrainedCreateReturn) {
                                                                 memgraph::auth::FineGrainedPermission::CREATE_DELETE);
     memgraph::glue::FineGrainedAuthChecker auth_checker{user};
     auto context = MakeContextWithFineGrainedChecker(storage, symbol_table, &dba, &auth_checker);
-    auto results = CollectProduce(*produce, &context);
-    EXPECT_EQ(0, results.size());
+    ASSERT_THROW(CollectProduce(*produce, &context), QueryRuntimeException);
   }
 }
 
@@ -294,23 +293,20 @@ TEST(QueryPlan, CreateExpand) {
   }
 }
 
-TEST(QueryPlan, FineGrainedCreateExpand) {
-  auto test_create_path = [&](bool cycle, int expected_nodes_created, int expected_edges_created,
-                              memgraph::auth::User &user) {
-    memgraph::storage::Storage db;
-    auto storage_dba = db.Access();
-    memgraph::query::DbAccessor dba(&storage_dba);
+class CreateExpandWithAuthFixture : public testing::Test {
+ protected:
+  memgraph::storage::Storage db;
+  memgraph::storage::Storage::Accessor storage_dba{db.Access()};
+  memgraph::query::DbAccessor dba{&storage_dba};
+  AstStorage storage;
+  SymbolTable symbol_table;
 
+  void ExecuteCreateExpand(bool cycle, memgraph::auth::User &user) {
     const auto label_node_1 = dba.NameToLabel("Node1");
     const auto label_node_2 = dba.NameToLabel("Node2");
     const auto property = PROPERTY_PAIR("property");
     const auto edge_type = dba.NameToEdgeType("edge_type");
 
-    SymbolTable symbol_table;
-    AstStorage storage;
-    int before_v = CountIterable(dba.Vertices(memgraph::storage::View::OLD));
-    int before_e = CountEdges(&dba, memgraph::storage::View::OLD);
-
     // data for the first node
     NodeCreationInfo n;
     n.symbol = symbol_table.CreateSymbol("n", true);
@@ -336,84 +332,100 @@ TEST(QueryPlan, FineGrainedCreateExpand) {
     auto context = MakeContextWithFineGrainedChecker(storage, symbol_table, &dba, &auth_checker);
     PullAll(*create_expand, &context);
     dba.AdvanceCommand();
+  }
 
-    EXPECT_EQ(CountIterable(dba.Vertices(memgraph::storage::View::OLD)) - before_v, expected_nodes_created);
-    EXPECT_EQ(CountEdges(&dba, memgraph::storage::View::OLD) - before_e, expected_edges_created);
-  };
+  void TestCreateExpandHypothesis(int expected_nodes_created, int expected_edges_created) {
+    EXPECT_EQ(CountIterable(dba.Vertices(memgraph::storage::View::NEW)), expected_nodes_created);
+    EXPECT_EQ(CountEdges(&dba, memgraph::storage::View::NEW), expected_edges_created);
+  }
+};
 
+TEST_F(CreateExpandWithAuthFixture, CreateExpandWithNoGrantsOnCreateDelete) {
   // All labels denied, All edge types denied
-  {
-    memgraph::auth::User user{"test"};
-    user.fine_grained_access_handler().label_permissions().Deny("*",
-                                                                memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    user.fine_grained_access_handler().edge_type_permissions().Deny(
-        "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    test_create_path(false, 0, 0, user);
-    test_create_path(true, 0, 0, user);
-  }
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Deny("*",
+                                                              memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().edge_type_permissions().Deny("*",
+                                                                  memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  ASSERT_THROW(ExecuteCreateExpand(false, user), QueryRuntimeException);
+  ASSERT_THROW(ExecuteCreateExpand(true, user), QueryRuntimeException);
+}
 
+TEST_F(CreateExpandWithAuthFixture, CreateExpandWithLabelsGrantedOnly) {
   // All labels granted, All edge types denied
-  {
-    memgraph::auth::User user{"test"};
-    user.fine_grained_access_handler().label_permissions().Grant("*",
-                                                                 memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    user.fine_grained_access_handler().edge_type_permissions().Deny(
-        "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    test_create_path(false, 1, 0, user);
-    test_create_path(true, 1, 0, user);
-  }
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Grant("*",
+                                                               memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().edge_type_permissions().Deny("*",
+                                                                  memgraph::auth::FineGrainedPermission::CREATE_DELETE);
 
+  ASSERT_THROW(ExecuteCreateExpand(false, user), QueryRuntimeException);
+  ASSERT_THROW(ExecuteCreateExpand(true, user), QueryRuntimeException);
+}
+
+TEST_F(CreateExpandWithAuthFixture, CreateExpandWithEdgeTypesGrantedOnly) {
   // All labels denied, All edge types granted
-  {
-    memgraph::auth::User user{"test"};
-    user.fine_grained_access_handler().label_permissions().Deny("*",
-                                                                memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    user.fine_grained_access_handler().edge_type_permissions().Grant(
-        "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    test_create_path(false, 0, 0, user);
-    test_create_path(true, 0, 0, user);
-  }
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Deny("*",
+                                                              memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().edge_type_permissions().Grant(
+      "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
 
+  ASSERT_THROW(ExecuteCreateExpand(false, user), QueryRuntimeException);
+  ASSERT_THROW(ExecuteCreateExpand(true, user), QueryRuntimeException);
+}
+
+TEST_F(CreateExpandWithAuthFixture, CreateExpandWithFirstLabelGranted) {
   // First label granted, All edge types granted
-  {
-    memgraph::auth::User user{"test"};
-    user.fine_grained_access_handler().label_permissions().Grant("Node1",
-                                                                 memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    user.fine_grained_access_handler().label_permissions().Deny("Node2",
-                                                                memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    user.fine_grained_access_handler().label_permissions().Deny("Node2", memgraph::auth::FineGrainedPermission::UPDATE);
-    user.fine_grained_access_handler().edge_type_permissions().Grant(
-        "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Grant("Node1",
+                                                               memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().label_permissions().Deny("Node2",
+                                                              memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().label_permissions().Deny("Node2", memgraph::auth::FineGrainedPermission::UPDATE);
+  user.fine_grained_access_handler().edge_type_permissions().Grant(
+      "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
 
-    test_create_path(false, 1, 0, user);
-    test_create_path(true, 1, 0, user);
-  }
+  ASSERT_THROW(ExecuteCreateExpand(false, user), QueryRuntimeException);
+  ASSERT_THROW(ExecuteCreateExpand(true, user), QueryRuntimeException);
+}
 
+TEST_F(CreateExpandWithAuthFixture, CreateExpandWithSecondLabelGranted) {
   // Second label granted, All edge types granted
-  {
-    memgraph::auth::User user{"test"};
-    user.fine_grained_access_handler().label_permissions().Grant("Node2",
-                                                                 memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    user.fine_grained_access_handler().label_permissions().Deny("Node1",
-                                                                memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    user.fine_grained_access_handler().edge_type_permissions().Grant(
-        "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Grant("Node2",
+                                                               memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().label_permissions().Deny("Node1",
+                                                              memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().edge_type_permissions().Grant(
+      "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
 
-    test_create_path(false, 0, 0, user);
-    test_create_path(true, 0, 0, user);
-  }
+  ASSERT_THROW(ExecuteCreateExpand(false, user), QueryRuntimeException);
+  ASSERT_THROW(ExecuteCreateExpand(true, user), QueryRuntimeException);
+}
 
+TEST_F(CreateExpandWithAuthFixture, CreateExpandWithoutCycleWithEverythingGranted) {
   // All labels granted, All edge types granted
-  {
-    memgraph::auth::User user{"test"};
-    user.fine_grained_access_handler().label_permissions().Grant("*",
-                                                                 memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    user.fine_grained_access_handler().edge_type_permissions().Grant(
-        "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Grant("*",
+                                                               memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().edge_type_permissions().Grant(
+      "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
 
-    test_create_path(false, 2, 1, user);
-    test_create_path(true, 1, 1, user);
-  }
+  ExecuteCreateExpand(false, user);
+  TestCreateExpandHypothesis(2, 1);
+}
+
+TEST_F(CreateExpandWithAuthFixture, CreateExpandWithCycleWithEverythingGranted) {
+  // All labels granted, All edge types granted
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Grant("*",
+                                                               memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().edge_type_permissions().Grant(
+      "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+
+  ExecuteCreateExpand(true, user);
+  TestCreateExpandHypothesis(1, 1);
 }
 
 TEST(QueryPlan, MatchCreateNode) {
@@ -445,12 +457,15 @@ TEST(QueryPlan, MatchCreateNode) {
   EXPECT_EQ(CountIterable(dba.Vertices(memgraph::storage::View::OLD)), 6);
 }
 
-TEST(QueryPlan, FineGrainedMatchCreateNode) {
-  auto test_match_create_node = [&](memgraph::auth::User &user, int expected_nodes) {
-    memgraph::storage::Storage db;
-    auto storage_dba = db.Access();
-    memgraph::query::DbAccessor dba(&storage_dba);
+class MatchCreateNodeWithAuthFixture : public testing::Test {
+ protected:
+  memgraph::storage::Storage db;
+  memgraph::storage::Storage::Accessor storage_dba{db.Access()};
+  memgraph::query::DbAccessor dba{&storage_dba};
+  AstStorage storage;
+  SymbolTable symbol_table;
 
+  void InitGraph() {
     // add three nodes we'll match and expand-create from
     memgraph::query::VertexAccessor v1{dba.InsertVertex()};
     memgraph::query::VertexAccessor v2{dba.InsertVertex()};
@@ -459,10 +474,9 @@ TEST(QueryPlan, FineGrainedMatchCreateNode) {
     ASSERT_TRUE(v2.AddLabel(dba.NameToLabel("l2")).HasValue());
     ASSERT_TRUE(v3.AddLabel(dba.NameToLabel("l3")).HasValue());
     dba.AdvanceCommand();
+  }
 
-    SymbolTable symbol_table;
-    AstStorage storage;
-    // first node
+  void ExecuteMatchCreate(memgraph::auth::User &user) {
     auto n_scan_all = MakeScanAll(storage, symbol_table, "n");
     // second node
     NodeCreationInfo m{};
@@ -477,41 +491,50 @@ TEST(QueryPlan, FineGrainedMatchCreateNode) {
 
     PullAll(*create_node, &context);
     dba.AdvanceCommand();
+  }
 
-    EXPECT_EQ(CountIterable(dba.Vertices(memgraph::storage::View::OLD)), expected_nodes);
-  };
+  void MatchCreateAssertion(int expected_result_size) {
+    EXPECT_EQ(CountIterable(dba.Vertices(memgraph::storage::View::OLD)), expected_result_size);
+  }
 
+  void ExecuteMatchCreateTestSuite(memgraph::auth::User &user, int expected_result_size) {
+    InitGraph();
+    ExecuteMatchCreate(user);
+    MatchCreateAssertion(expected_result_size);
+  }
+};
+
+TEST_F(MatchCreateNodeWithAuthFixture, MatchCreateWithAllLabelsDeniedThrows) {
   // All labels denied
-  {
-    memgraph::auth::User user{"test"};
-    user.fine_grained_access_handler().label_permissions().Deny("*",
-                                                                memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Deny("*",
+                                                              memgraph::auth::FineGrainedPermission::CREATE_DELETE);
 
-    test_match_create_node(user, 3);
-  }
+  ASSERT_THROW(ExecuteMatchCreateTestSuite(user, 3), QueryRuntimeException);
+}
 
-  // All labels granted
-  {
-    memgraph::auth::User user{"test"};
-    user.fine_grained_access_handler().label_permissions().Grant("*",
-                                                                 memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+TEST_F(MatchCreateNodeWithAuthFixture, MatchCreateWithAllLabelsGrantedExecutes) {
+  // All labels granteddenieddenieddenied
 
-    test_match_create_node(user, 6);
-  }
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Grant("*",
+                                                               memgraph::auth::FineGrainedPermission::CREATE_DELETE);
 
+  ExecuteMatchCreateTestSuite(user, 6);
+}
+
+TEST_F(MatchCreateNodeWithAuthFixture, MatchCreateWithOneLabelDeniedThrows) {
   // Label2 denied
-  {
-    memgraph::auth::User user{"test"};
-    user.fine_grained_access_handler().label_permissions().Grant("l1",
-                                                                 memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    user.fine_grained_access_handler().label_permissions().Grant("l3",
-                                                                 memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Grant("l1",
+                                                               memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().label_permissions().Grant("l3",
+                                                               memgraph::auth::FineGrainedPermission::CREATE_DELETE);
 
-    user.fine_grained_access_handler().label_permissions().Deny("l2",
-                                                                memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().label_permissions().Deny("l2",
+                                                              memgraph::auth::FineGrainedPermission::CREATE_DELETE);
 
-    test_match_create_node(user, 3);
-  }
+  ASSERT_THROW(ExecuteMatchCreateTestSuite(user, 3), QueryRuntimeException);
 }
 
 TEST(QueryPlan, MatchCreateExpand) {
@@ -562,13 +585,15 @@ TEST(QueryPlan, MatchCreateExpand) {
   test_create_path(true, 0, 6);
 }
 
-TEST(QueryPlan, FineGrainedMatchCreateExpand) {
-  auto test_create_path = [&](bool cycle, int expected_nodes_created, int expected_edges_created,
-                              memgraph::auth::User &user) {
-    memgraph::storage::Storage db;
-    auto storage_dba = db.Access();
-    memgraph::query::DbAccessor dba(&storage_dba);
+class MatchCreateExpandWithAuthFixture : public testing::Test {
+ protected:
+  memgraph::storage::Storage db;
+  memgraph::storage::Storage::Accessor storage_dba{db.Access()};
+  memgraph::query::DbAccessor dba{&storage_dba};
+  AstStorage storage;
+  SymbolTable symbol_table;
 
+  void InitGraph() {
     // add three nodes we'll match and expand-create from
     memgraph::query::VertexAccessor v1{dba.InsertVertex()};
     memgraph::query::VertexAccessor v2{dba.InsertVertex()};
@@ -576,16 +601,11 @@ TEST(QueryPlan, FineGrainedMatchCreateExpand) {
     ASSERT_TRUE(v1.AddLabel(dba.NameToLabel("l1")).HasValue());
     ASSERT_TRUE(v2.AddLabel(dba.NameToLabel("l2")).HasValue());
     ASSERT_TRUE(v3.AddLabel(dba.NameToLabel("l3")).HasValue());
-    memgraph::storage::EdgeTypeId edge_type = dba.NameToEdgeType("edge_type");
 
     dba.AdvanceCommand();
+  }
 
-    SymbolTable symbol_table;
-    AstStorage storage;
-
-    int before_v = CountIterable(dba.Vertices(memgraph::storage::View::OLD));
-    int before_e = CountEdges(&dba, memgraph::storage::View::OLD);
-
+  void ExecuteMatchCreateExpand(memgraph::auth::User &user, bool cycle) {
     // data for the first node
     auto n_scan_all = MakeScanAll(storage, symbol_table, "n");
 
@@ -598,87 +618,117 @@ TEST(QueryPlan, FineGrainedMatchCreateExpand) {
     EdgeCreationInfo r;
     r.symbol = symbol_table.CreateSymbol("r", true);
     r.direction = EdgeAtom::Direction::OUT;
-    r.edge_type = edge_type;
+    r.edge_type = dba.NameToEdgeType("edge_type");
+    ;
 
     auto create_expand = std::make_shared<CreateExpand>(m, r, n_scan_all.op_, n_scan_all.sym_, cycle);
     memgraph::glue::FineGrainedAuthChecker auth_checker{user};
     auto context = MakeContextWithFineGrainedChecker(storage, symbol_table, &dba, &auth_checker);
     PullAll(*create_expand, &context);
     dba.AdvanceCommand();
+  }
 
-    EXPECT_EQ(CountIterable(dba.Vertices(memgraph::storage::View::OLD)) - before_v, expected_nodes_created);
-    EXPECT_EQ(CountEdges(&dba, memgraph::storage::View::OLD) - before_e, expected_edges_created);
-  };
+  void MatchCreateExpandAssertion(int expected_nodes_size, int expected_edges_size) {
+    EXPECT_EQ(CountIterable(dba.Vertices(memgraph::storage::View::NEW)), expected_nodes_size);
+    EXPECT_EQ(CountEdges(&dba, memgraph::storage::View::NEW), expected_edges_size);
+  }
 
+  void ExecuteMatchCreateExpandTestSuite(bool cycle, int expected_nodes_size, int expected_edges_size,
+                                         memgraph::auth::User &user) {
+    InitGraph();
+    ExecuteMatchCreateExpand(user, cycle);
+    MatchCreateExpandAssertion(expected_nodes_size, expected_edges_size);
+  }
+};
+
+TEST_F(MatchCreateExpandWithAuthFixture, MatchCreateExpandThrowsWhenDeniedEverything) {
   // All labels denied, All edge types denied
-  {
-    memgraph::auth::User user{"test"};
-    user.fine_grained_access_handler().label_permissions().Deny("*",
-                                                                memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    user.fine_grained_access_handler().edge_type_permissions().Deny(
-        "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    test_create_path(false, 0, 0, user);
-    test_create_path(true, 0, 0, user);
-  }
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Deny("*",
+                                                              memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().edge_type_permissions().Deny("*",
+                                                                  memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  ASSERT_THROW(ExecuteMatchCreateExpandTestSuite(false, 0, 0, user), QueryRuntimeException);
+  ASSERT_THROW(ExecuteMatchCreateExpandTestSuite(true, 0, 0, user), QueryRuntimeException);
+}
 
+TEST_F(MatchCreateExpandWithAuthFixture, MatchCreateExpandThrowsWhenDeniedEdgeTypes) {
   // All labels granted, All edge types denied
-  {
-    memgraph::auth::User user{"test"};
-    user.fine_grained_access_handler().label_permissions().Grant("*",
-                                                                 memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    user.fine_grained_access_handler().edge_type_permissions().Deny(
-        "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    test_create_path(false, 0, 0, user);
-    test_create_path(true, 0, 0, user);
-  }
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Grant("*",
+                                                               memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().edge_type_permissions().Deny("*",
+                                                                  memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  ASSERT_THROW(ExecuteMatchCreateExpandTestSuite(false, 0, 0, user), QueryRuntimeException);
+  ASSERT_THROW(ExecuteMatchCreateExpandTestSuite(true, 0, 0, user), QueryRuntimeException);
+}
 
+TEST_F(MatchCreateExpandWithAuthFixture, MatchCreateExpandThrowsWhenDeniedLabels) {
   // All labels denied, All edge types granted
-  {
-    memgraph::auth::User user{"test"};
-    user.fine_grained_access_handler().label_permissions().Deny("*", memgraph::auth::FineGrainedPermission::UPDATE);
-    user.fine_grained_access_handler().edge_type_permissions().Grant(
-        "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    test_create_path(false, 0, 0, user);
-    test_create_path(true, 0, 0, user);
-  }
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Deny("*", memgraph::auth::FineGrainedPermission::UPDATE);
+  user.fine_grained_access_handler().edge_type_permissions().Grant(
+      "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  ASSERT_THROW(ExecuteMatchCreateExpandTestSuite(false, 0, 0, user), QueryRuntimeException);
+  ASSERT_THROW(ExecuteMatchCreateExpandTestSuite(true, 0, 0, user), QueryRuntimeException);
+}
 
+TEST_F(MatchCreateExpandWithAuthFixture, MatchCreateExpandThrowsWhenDeniedOneLabel) {
   // First two label granted, All edge types granted
-  {
-    memgraph::auth::User user{"test"};
-    user.fine_grained_access_handler().label_permissions().Grant("l1", memgraph::auth::FineGrainedPermission::UPDATE);
-    user.fine_grained_access_handler().label_permissions().Grant("l3", memgraph::auth::FineGrainedPermission::UPDATE);
-    user.fine_grained_access_handler().label_permissions().Deny("l2", memgraph::auth::FineGrainedPermission::UPDATE);
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Grant("l1", memgraph::auth::FineGrainedPermission::UPDATE);
+  user.fine_grained_access_handler().label_permissions().Grant("l3", memgraph::auth::FineGrainedPermission::UPDATE);
+  user.fine_grained_access_handler().label_permissions().Deny("l2", memgraph::auth::FineGrainedPermission::UPDATE);
 
-    user.fine_grained_access_handler().edge_type_permissions().Grant(
-        "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().edge_type_permissions().Grant(
+      "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
 
-    test_create_path(false, 0, 0, user);
-    test_create_path(true, 0, 0, user);
-  }
+  ASSERT_THROW(ExecuteMatchCreateExpandTestSuite(false, 0, 0, user), QueryRuntimeException);
+  ASSERT_THROW(ExecuteMatchCreateExpandTestSuite(true, 0, 0, user), QueryRuntimeException);
+}
 
+TEST_F(MatchCreateExpandWithAuthFixture, MatchCreateExpandWithoutCycleExecutesWhenGrantedSpecificallyEverything) {
   // All label granted, Specific edge type granted
-  {
-    memgraph::auth::User user{"test"};
-    user.fine_grained_access_handler().label_permissions().Grant("*",
-                                                                 memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    user.fine_grained_access_handler().edge_type_permissions().Grant(
-        "edge_type", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Grant("*",
+                                                               memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().edge_type_permissions().Grant(
+      "edge_type", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
 
-    test_create_path(false, 3, 3, user);
-    test_create_path(true, 0, 3, user);
-  }
+  ExecuteMatchCreateExpandTestSuite(false, 6, 3, user);
+}
 
+TEST_F(MatchCreateExpandWithAuthFixture, MatchCreateExpandWithCycleExecutesWhenGrantedSpecificallyEverything) {
+  // All label granted, Specific edge type granted
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Grant("*",
+                                                               memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().edge_type_permissions().Grant(
+      "edge_type", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+
+  ExecuteMatchCreateExpandTestSuite(true, 3, 3, user);
+}
+
+TEST_F(MatchCreateExpandWithAuthFixture, MatchCreateExpandWithoutCycleExecutesWhenGrantedEverything) {
   // All labels granted, All edge types granted
-  {
-    memgraph::auth::User user{"test"};
-    user.fine_grained_access_handler().label_permissions().Grant("*",
-                                                                 memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    user.fine_grained_access_handler().edge_type_permissions().Grant(
-        "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Grant("*",
+                                                               memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().edge_type_permissions().Grant(
+      "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
 
-    test_create_path(false, 3, 3, user);
-    test_create_path(true, 0, 3, user);
-  }
+  ExecuteMatchCreateExpandTestSuite(false, 6, 3, user);
+}
+
+TEST_F(MatchCreateExpandWithAuthFixture, MatchCreateExpandWithCycleExecutesWhenGrantedEverything) {
+  // All labels granted, All edge types granted
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Grant("*",
+                                                               memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().edge_type_permissions().Grant(
+      "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+
+  ExecuteMatchCreateExpandTestSuite(true, 3, 3, user);
 }
 
 TEST(QueryPlan, Delete) {
@@ -752,8 +802,15 @@ TEST(QueryPlan, Delete) {
   }
 }
 
-TEST(QueryPlan, FineGrainedDelete) {
-  auto init_graph = [](memgraph::query::DbAccessor &dba) {
+class DeleteOperatorWithAuthFixture : public testing::Test {
+ protected:
+  memgraph::storage::Storage db;
+  memgraph::storage::Storage::Accessor storage_dba{db.Access()};
+  memgraph::query::DbAccessor dba{&storage_dba};
+  AstStorage storage;
+  SymbolTable symbol_table;
+
+  void InitGraph() {
     std::vector<memgraph::query::VertexAccessor> vertices;
     for (int i = 0; i < 4; ++i) {
       memgraph::query::VertexAccessor v{dba.InsertVertex()};
@@ -768,20 +825,15 @@ TEST(QueryPlan, FineGrainedDelete) {
     }
 
     dba.AdvanceCommand();
+
+    assertInitGraphValid();
+  }
+
+  void TestDeleteNodesHypothesis(int expected_result_size) {
+    EXPECT_EQ(expected_result_size, CountIterable(dba.Vertices(memgraph::storage::View::NEW)));
   };
 
-  auto test_delete_node = [&](memgraph::auth::User &user, int expected_nodes) {
-    memgraph::storage::Storage db;
-    auto storage_dba = db.Access();
-    memgraph::query::DbAccessor dba(&storage_dba);
-
-    // make a fully-connected (one-direction, no cycles) with 4 nodes
-    init_graph(dba);
-    EXPECT_EQ(4, CountIterable(dba.Vertices(memgraph::storage::View::OLD)));
-    EXPECT_EQ(6, CountEdges(&dba, memgraph::storage::View::OLD));
-
-    AstStorage storage;
-    SymbolTable symbol_table;
+  void DeleteAllNodes(memgraph::auth::User &user) {
     auto n = MakeScanAll(storage, symbol_table, "n");
     auto n_get = storage.Create<Identifier>("n")->MapTo(n.sym_);
     Frame frame(symbol_table.max_position());
@@ -790,21 +842,20 @@ TEST(QueryPlan, FineGrainedDelete) {
     auto delete_op = std::make_shared<plan::Delete>(n.op_, std::vector<Expression *>{n_get}, true);
     PullAll(*delete_op, &context);
     dba.AdvanceCommand();
-    EXPECT_EQ(expected_nodes, CountIterable(dba.Vertices(memgraph::storage::View::NEW)));
   };
 
-  auto test_delete_edges = [&](memgraph::auth::User &user, int expected_edges) {
-    memgraph::storage::Storage db;
-    auto storage_dba = db.Access();
-    memgraph::query::DbAccessor dba(&storage_dba);
-
+  void ExecuteDeleteNodesTestSuite(memgraph::auth::User &user, int expected_nodes) {
     // make a fully-connected (one-direction, no cycles) with 4 nodes
-    init_graph(dba);
-    EXPECT_EQ(4, CountIterable(dba.Vertices(memgraph::storage::View::OLD)));
-    EXPECT_EQ(6, CountEdges(&dba, memgraph::storage::View::OLD));
+    InitGraph();
+    DeleteAllNodes(user);
+    TestDeleteNodesHypothesis(expected_nodes);
+  };
 
-    AstStorage storage;
-    SymbolTable symbol_table;
+  void TestDeleteEdgesHypothesis(int expected_result_size) {
+    EXPECT_EQ(expected_result_size, CountEdges(&dba, memgraph::storage::View::NEW));
+  };
+
+  void DeleteAllEdges(memgraph::auth::User &user) {
     auto n = MakeScanAll(storage, symbol_table, "n");
     auto r_m = MakeExpand(storage, symbol_table, n.op_, n.sym_, "r", EdgeAtom::Direction::OUT, {}, "m", false,
                           memgraph::storage::View::NEW);
@@ -814,66 +865,89 @@ TEST(QueryPlan, FineGrainedDelete) {
     auto context = MakeContextWithFineGrainedChecker(storage, symbol_table, &dba, &auth_checker);
     PullAll(*delete_op, &context);
     dba.AdvanceCommand();
-    EXPECT_EQ(expected_edges, CountEdges(&dba, memgraph::storage::View::NEW));
   };
 
+  void ExecuteDeleteEdgesTestSuite(memgraph::auth::User &user, int expected_edges) {
+    // make a fully-connected (one-direction, no cycles) with 4 nodes
+    InitGraph();
+    DeleteAllEdges(user);
+    TestDeleteEdgesHypothesis(expected_edges);
+  };
+
+ private:
+  void assertInitGraphValid() {
+    EXPECT_EQ(4, CountIterable(dba.Vertices(memgraph::storage::View::OLD)));
+    EXPECT_EQ(6, CountEdges(&dba, memgraph::storage::View::OLD));
+  }
+};
+
+TEST_F(DeleteOperatorWithAuthFixture, DeleteNodeThrowsExceptionWhenAllLabelsDenied) {
   // All labels denied
-  {
-    memgraph::auth::User user{"test"};
-    user.fine_grained_access_handler().label_permissions().Deny("*",
-                                                                memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Deny("*",
+                                                              memgraph::auth::FineGrainedPermission::CREATE_DELETE);
 
-    test_delete_node(user, 4);
-  }
+  ASSERT_THROW(ExecuteDeleteNodesTestSuite(user, 0), QueryRuntimeException);
+}
 
+TEST_F(DeleteOperatorWithAuthFixture, DeleteNodeThrowsExceptionWhenPartialLabelsGranted) {
   // One Label granted
-  {
-    memgraph::auth::User user{"test"};
-    user.fine_grained_access_handler().label_permissions().Grant("l1",
-                                                                 memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    test_delete_node(user, 3);
-  }
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Grant("l1",
+                                                               memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().label_permissions().Grant("*", memgraph::auth::FineGrainedPermission::READ);
+  ASSERT_THROW(ExecuteDeleteNodesTestSuite(user, 0), QueryRuntimeException);
+}
 
+TEST_F(DeleteOperatorWithAuthFixture, DeleteNodeExecutesWhenGrantedAllLabels) {
+  // All labels granted
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Grant("*",
+                                                               memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  ExecuteDeleteNodesTestSuite(user, 0);
+}
+TEST_F(DeleteOperatorWithAuthFixture, DeleteNodeThrowsExceptionWhenEdgeTypesNotGranted) {
   // All labels granted,All edge types denied
-  {
-    memgraph::auth::User user{"test"};
-    user.fine_grained_access_handler().label_permissions().Grant("*", memgraph::auth::FineGrainedPermission::UPDATE);
-    user.fine_grained_access_handler().edge_type_permissions().Deny(
-        "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-
-    test_delete_edges(user, 6);
-  }
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Grant("*", memgraph::auth::FineGrainedPermission::UPDATE);
+  user.fine_grained_access_handler().edge_type_permissions().Deny("*",
+                                                                  memgraph::auth::FineGrainedPermission::CREATE_DELETE);
 
+  ASSERT_THROW(ExecuteDeleteNodesTestSuite(user, 0), QueryRuntimeException);
+}
+TEST_F(DeleteOperatorWithAuthFixture, DeleteEdgesThrowsErrorWhenPartialGrant) {
   // Specific label granted, Specific edge types granted
-  {
-    memgraph::auth::User user{"test"};
-    user.fine_grained_access_handler().label_permissions().Grant("l1", memgraph::auth::FineGrainedPermission::UPDATE);
-    user.fine_grained_access_handler().label_permissions().Grant("l2", memgraph::auth::FineGrainedPermission::UPDATE);
-    user.fine_grained_access_handler().label_permissions().Deny("l3", memgraph::auth::FineGrainedPermission::UPDATE);
-    user.fine_grained_access_handler().label_permissions().Deny("l4", memgraph::auth::FineGrainedPermission::UPDATE);
-    user.fine_grained_access_handler().edge_type_permissions().Grant(
-        "type0", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    user.fine_grained_access_handler().edge_type_permissions().Grant(
-        "type1", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    user.fine_grained_access_handler().edge_type_permissions().Deny(
-        "type2", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    user.fine_grained_access_handler().edge_type_permissions().Deny(
-        "type3", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
 
-    test_delete_edges(user, 5);
-  }
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Grant("l1", memgraph::auth::FineGrainedPermission::UPDATE);
+  user.fine_grained_access_handler().label_permissions().Grant("l2", memgraph::auth::FineGrainedPermission::UPDATE);
+  user.fine_grained_access_handler().label_permissions().Deny("l3", memgraph::auth::FineGrainedPermission::UPDATE);
+  user.fine_grained_access_handler().label_permissions().Deny("l4", memgraph::auth::FineGrainedPermission::UPDATE);
+  user.fine_grained_access_handler().edge_type_permissions().Grant(
+      "type0", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().edge_type_permissions().Grant(
+      "type1", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().edge_type_permissions().Deny("type2",
+                                                                  memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().edge_type_permissions().Deny("type3",
+                                                                  memgraph::auth::FineGrainedPermission::CREATE_DELETE);
 
+  ASSERT_THROW(ExecuteDeleteEdgesTestSuite(user, 0), QueryRuntimeException);
+}
+
+TEST_F(DeleteOperatorWithAuthFixture, DeleteNodeAndDeleteEdgePerformWhenGranted) {
   // All labels granted, All edge_types granted
-  {
-    memgraph::auth::User user{"test"};
-    user.fine_grained_access_handler().label_permissions().Grant("*",
-                                                                 memgraph::auth::FineGrainedPermission::CREATE_DELETE);
-    user.fine_grained_access_handler().edge_type_permissions().Grant(
-        "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
 
-    test_delete_node(user, 0);
-    test_delete_edges(user, 0);
-  }
+  memgraph::auth::User user{"test"};
+  user.fine_grained_access_handler().label_permissions().Grant("*",
+                                                               memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+  user.fine_grained_access_handler().edge_type_permissions().Grant(
+      "*", memgraph::auth::FineGrainedPermission::CREATE_DELETE);
+
+  InitGraph();
+  DeleteAllNodes(user);
+  TestDeleteNodesHypothesis(0);
+  TestDeleteEdgesHypothesis(0);
 }
 
 TEST(QueryPlan, DeleteTwiceDeleteBlockingEdge) {
@@ -1883,6 +1957,43 @@ TEST_F(UpdatePropertiesWithAuthFixture, SetPropertyWithAuthChecker) {
     test_remove_hypothesis(0);
   }
 
+  {
+    auto user = memgraph::auth::User{"granted_read_label"};
+
+    user.fine_grained_access_handler().label_permissions().Grant(vertex_label_name,
+                                                                 memgraph::auth::FineGrainedPermission::READ);
+
+    SetVertexProperty(v);
+    ASSERT_THROW(ExecuteSetPropertyOnVertex(user, 2), QueryRuntimeException);
+    test_hypothesis(1);
+
+    SetVertexProperty(v);
+    ASSERT_THROW(ExecuteSetPropertiesOnVertex(user, 2), QueryRuntimeException);
+    test_hypothesis(1);
+
+    SetVertexProperty(v);
+    ASSERT_THROW(ExecuteRemovePropertyOnVertex(user), QueryRuntimeException);
+    test_remove_hypothesis(1);
+  }
+
+  {
+    auto user = memgraph::auth::User{"granted_read_global"};
+
+    user.fine_grained_access_handler().label_permissions().Grant("*", memgraph::auth::FineGrainedPermission::READ);
+
+    SetVertexProperty(v);
+    ASSERT_THROW(ExecuteSetPropertyOnVertex(user, 2), QueryRuntimeException);
+    test_hypothesis(1);
+
+    SetVertexProperty(v);
+    ASSERT_THROW(ExecuteSetPropertiesOnVertex(user, 2), QueryRuntimeException);
+    test_hypothesis(1);
+
+    SetVertexProperty(v);
+    ASSERT_THROW(ExecuteRemovePropertyOnVertex(user), QueryRuntimeException);
+    test_remove_hypothesis(1);
+  }
+
   {
     auto user = memgraph::auth::User{"granted_update_label_denied_read_global"};
 
@@ -2115,6 +2226,45 @@ TEST_F(UpdatePropertiesWithAuthFixture, SetPropertyExpandWithAuthChecker) {
     test_remove_hypothesis(0);
   }
 
+  {
+    auto user = memgraph::auth::User{"granted_read_edge_type"};
+
+    user.fine_grained_access_handler().label_permissions().Grant("*", memgraph::auth::FineGrainedPermission::READ);
+    user.fine_grained_access_handler().edge_type_permissions().Grant(edge_type_name,
+                                                                     memgraph::auth::FineGrainedPermission::READ);
+
+    SetEdgeProperty(edge.GetValue());
+    ASSERT_THROW(ExecuteSetPropertyOnEdge(user, 2), QueryRuntimeException);
+    test_hypothesis(1);
+
+    SetEdgeProperty(edge.GetValue());
+    ASSERT_THROW(ExecuteSetPropertiesOnEdge(user, 2), QueryRuntimeException);
+    test_hypothesis(1);
+
+    SetEdgeProperty(edge.GetValue());
+    ASSERT_THROW(ExecuteRemovePropertyOnEdge(user), QueryRuntimeException);
+    test_remove_hypothesis(1);
+  }
+
+  {
+    auto user = memgraph::auth::User{"granted_read_global"};
+
+    user.fine_grained_access_handler().label_permissions().Grant("*", memgraph::auth::FineGrainedPermission::READ);
+    user.fine_grained_access_handler().edge_type_permissions().Grant("*", memgraph::auth::FineGrainedPermission::READ);
+
+    SetEdgeProperty(edge.GetValue());
+    ASSERT_THROW(ExecuteSetPropertyOnEdge(user, 2), QueryRuntimeException);
+    test_hypothesis(1);
+
+    SetEdgeProperty(edge.GetValue());
+    ASSERT_THROW(ExecuteSetPropertiesOnEdge(user, 2), QueryRuntimeException);
+    test_hypothesis(1);
+
+    SetEdgeProperty(edge.GetValue());
+    ASSERT_THROW(ExecuteRemovePropertyOnEdge(user), QueryRuntimeException);
+    test_remove_hypothesis(1);
+  }
+
   {
     auto user = memgraph::auth::User{"granted_update_global_denied_read_edge_type"};