This checklist was developed by IST system administrators to provide guidance for securing databases storing sensitive or restricted data. Implementing these security controls will help to prevent data loss, leakage, or unauthorized access to your databases.