After implementing a security policy, you need to audit actions within the database. Chapter 7, provides specific information on implementing an auditing policy.