MySQL security guidelines & best practices in order to minimize your database attack surface
+ Regulations
    – GDPR, General Data Protection Regulation: Protection of Personal Data
    – PCI – DSS: Payment Card Data
    – HIPAA: Privacy of Health Data
    – Sarbanes Oxley, GLBA, The USA Patriot Act:
    – Financial Data, NPI "personally identifiable financial information"
    – FERPA – Student Data
    – Data Protection Act (UK): Protection of Personal Data
+ Requirements
    – Continuous Monitoring (Users, Schema, Backups, etc)
    – Data Protection (Encryption, Privilege Management, etc.)
    – Data Retention (Backups, User Activity, etc.)
    – Data Auditing (User activity, etc.)
Regulations require these Security Steps:
+ Assess: 
    - Locate Risks and Vulnerabilities, Ensure necessary security controls
+ Prevent: 
    - Using Cryptography, User Controls, Access Controls, etc...
+ Detect: 
    - Still a possibility of a breach – so Audit, Monitor, Alert
+ Recover: 
    - Ensure service is not interrupted as a result of a security incident
    - Even through the outage of a primary database
    - Forensics – postmortem – fix vulnerability