Bestpractices for contained databases
Usethe default (off) setting for contained database authentication and only turnthis setting on if it is required.
Protectbackups of contained databases using passwords.
Auditthe capabilities of users and modules in contained databases.
Auditlogins that have the ability to set containment, if contained databaseauthentication is allowed.
Disablethe guest account on databases that share an instance with contained databases.
Takecare to avoid login/user-with-login naming conflicts
Avoidconnection strings with initial catalog if contained database authentication ispermitted.