capturing actual data values in audit logs creates a second copy of sensitive data. Ensure audit logs are protected with the same rigor as the database itself.