Configuring the data sources in the database system so that they will have read-only access is recommended.
Critical information (e.g. connection strings) will be saved in encrypted format.