The document discusses selecting a new database management system. It recommends determining if the vendor offers auditing, reporting and data management tools, and ensuring the software provides application level security and interfaces with corporate access granting procedures. Authentication should use secure protocols like SSL, and data encryption is also important. Application security gateways can understand applications, track user access, and perform deep packet inspection to determine access attempts. Organizational policies should be documented and reports automatically generated covering topics like compliance, risk assessment and investigating exceptions. All database requests should be logged and a full audit trail extractable, containing information like who accessed what data and from where.