Which of the following will best help you ensure a database server can withstand a recently discovered vulnerability?