- Enabling public access to the database instance
- Storing sensitive data in plaintext format
- Using SSL/TLS encryption for data in transit
- Disabling automated backups and monitoring