The best tactical approach for securing database applications is:
Top down
Bottom up
End-to-end
Across the lifecycle of the application
Using a combination of all of the above