Configure the Server to allow for Security
Maintain Log files on the Server
Monitor Server Activity
Establish and Maintain Database User Accounts
Secure the Server and the Database