Restrict access to systems and servers.
Create database devices.
Execute server security and other scripts.