In this chapter, you've learned how to secure your data and your database engine. We covered many ways to secure your data, whether through granular security or roles. Another mechanism is to assume the attacker can get the data but can't read the sensitive data due to encryption. Now that you know how to protect your SQL Server data, Chapter 10 talks more about implementing your changes through various stages of the development lifecycle by using proper change management.