1
Protection of stored data
Use strong encryption to protect the data stored in the database
Restrict access to stored data to only the necessary persons
2
Protection of transmitted data
Use SSL to protect data when transmitting over open networks
Do not transmit data over open networks without encryption
3
Updating systems and applications
Regularly update operating systems, applications and other software to eliminate vulnerabilities
Do not use software that is no longer supported