Your time would be better spent ensuring that a hacker can't get in at all, because as soon as you start making pessimistic assumptions like above, then you can be sure that a hacker Will get into both servers.
You could create an audit system via triggers that makes log entires anytime someone does an insert/update/delete to a table/tables on your DB Server, but this doesn't stop a hacker who's gained SA access from just nuking your audit tables or master DB.
Concentrate on Security, putting good code in place to prevent SQL Injection Attacks, Making sure you use SQL Login Accounts in your application with only the permissions they need, ensuring your database is behind a DMZ and not publically accessible, proper firewall and port security on the outside to ensure that only your Web/Public facing service ports are open.
If this is for a production environment and is beyond your expertise, there are security companies who will analyse you applications for any vulneribilities as well