To ensure optimal database security, the security administrator must configure the system to audit security events and then monitor the logs to detect breaches in security and, where necessary, repel security threats. If the administrator detects unauthorized or undesirable activity, they can take remedial actions to address the problem.