en when protected with secure authentication mechanisms.РConfigure the database server to only allow access to trusted systems. For example, the PCI DSS standard requires you to place the database in an work zone, segregated from the DMZР192.168.4.121Р高РThe database allows any remote system the ability to connect to it. It is mended to limit direct access to trusted systems because databases may contain sensitive data, and new vulnerabilities and exploits are discovered routinely for them. For this reason, it is a violation of PCI DSS section 1.3.7 to have databases listening on ports accessible from the , even РConfigure the database server to only allow access to trusted systems. For example, the PCI DSS standard requires you to place the database in an work zone, segregated from the DMZ