We presented the methodology used for creating the
benchmark and discussed it thoroughly. The methodology is
based on the identification of security mechanisms by
analyzing database security best practices. We also proposed
an approach to evaluate the relative importance of these
mechanisms based on expert judgment. With our
methodology, we devised 112 different security mechanisms
from an original list of 64 security best practices.