This document discusses techniques for securing databases. It describes database security as protecting databases from threats to their confidentiality, integrity and availability. It identifies various threats such as unauthorized access, malware infections, and physical damage. It then outlines several layers of security controls that can be implemented, including access control, authentication, encryption, backups and application security. It emphasizes that database security requires a multifaceted approach including technical, administrative and physical controls.
Related topics: