Protect

After you identify databases and file systems that contain sensitive data, you can take several steps to protect that data. Protection options include masking data, alerting personnel based on data access, and establishing policies that enforce access restrictions.