Ideally, all data access should occur through a Service-Oriented Architecture that will have its own access rules. Data should not be directly accessible except through other processes that own the data. This practice will help prevent unauthorized access or its accidental destruction.
|