B. Identifying Security Mechanisms
The list of security recommendations for database
installations can be used to extrapolate the mechanisms
necessary to fulfill those recommendations. In fact, if the list
of recommendations is comprehensive and representative
enough, then the list of security mechanisms derived from it
shall also be representative. The process, however, is not
straightforward and requires several steps of careful analysis.