JA, Hmmm, @hatzisn
Has few strategies there. If you're running a server then you will already appreciate that its about keeping the hacker out of the house, not what number room your lunch is in.
So, I wouldn't worry about what the DB is called (give a randomised 128-bit word for all it matters). Best practice lies at another level.
Of course if it involves PHP make sure that the scripts' folders are secure.
@hatzisn doesn't seem to mention firewall rules. I've used the IP capture strategy before that restricted access to within a limited IP range (but that's from PHP and works in browser limitation mode obviously.
But, naming was about convention rather than "best practice" - which I've never seen listed as an relevant issue - well, just never seen it mentioned, full-stop. (but, then, I don't read much.)
along with a "in the device" local DB...
I guess this means SQLite? on the phone. So if there is a TX between the server and the phone that represents a transmission interception risk point. That's a different debate. [[start a new thread ?]]
I guess best practice involves naming things so that you remember that name in six months time - when the maintenance headache hits you.