This chapter has shown that there is quite a bit to creating guards and walls. This is the reason I emphasize making the creation of guards and walls a specialized task within your organization.
Here are the major lessons of this chapter:
The walls are primarily responsible for fortification.
Three technologies are typically used to build walls:
Database security configuration
All data coming into the fortress must be validated. Validation includes
Checking for string length violations
Checking for unexpected characters
Auditing is important if you need to track fortress changes.
Authentication is needed to verify that requests are coming from approved sources. Authentication is done with encryption/decryption algorithms ...