Transparent Data Encryption

The Lightning Round

By Bradley Ball MCTS, MCITP

Speaker Introduction Bradley Ball      

Over 10 Years IT Experience Previous experience DBA, for the U.S. Army, The Executive Office of the President Currently a Sr. SQL DBA at Publix MCITP SQL 2005 DBA, MCTS SQL 2008 DBA Blog: http://www.SQLBalls.com Twitter: @SQLBalls

Agenda What is Transparent Data Encryption (TDE)  What does TDE do, how does TDE work 



Managing Certificates

Why Choose TDE Additional layer of security  Required by some regulatory compliance laws  Business Requirements  Customer Security 

When Data is Missing or Stolen 

Thieves Steal Personal Data of 26.5M Vets 



Information on 207,000 Army Reservists Stolen 



http://www.usatoday.com/money/industries/retail/2007-11-30-tjx-visa-breachsettlement_N.htm

Idaho Power says Mercer breach affected over 375,000 



http://www.informationweek.com/news/security/showArticle.jhtml?articleID=199203277

TJX, Visa reach $40.9M settlement for data breach 



http://www.govinfosecurity.com/articles.php?art_id=2527

Estimates Put T.J. Maxx Security Fiasco At $4.5 Billion 



http://www.washingtonpost.com/wpdyn/content/article/2006/05/22/AR2006052200839.html

http://www.idahopower.com/pdfs/newscommunity/news/MercerIncidentFAQs081310.pdf

East Moreland Surgical Clinic Burglarized, 800,000 Patents Info on Stolen Media 

http://health.einnews.com/pr-news/151784-eastmoreland-surgical-clinic-burglarized

What is Transparent Data Encryption A Physical Security Database level Encryption Solution  Transparent Data Encryption is a means to encrypt the contents of a SQL Server Database on the Windows API storage level.  It performs real time Encryption and Decryption of the data files , Database Backup Files (Full, Differential, Transactional, and Filegroup), and related Database Snapshots. 

SQL Version’s & Compatibility Transparent Data Encryption is available in the following SQL Editions:  SQL 2008 Enterprise Edition  SQL 2008 Developer Edition  SQL 2008 R2 Enterprise Edition  SQL 2008 R2 Developer Edition  SQL 2008 R2 Datacenter Edition 

How Do you implement TDE There are 4 Steps Create a Master Key (Master database) 2. Create a Server Certificate (Master database) 3. Create a Database Encryption Key (User database) 4. Enable Encryption (User database) 1.

Supported Encryption Algorithms 

AES  128 bit  196 bit  256 bit

3 Key Triple DES  Cipher Block Chaining 

Architecture

When Enabling TDE Time to encryption is based on Size  Only DDL Database File level commands will be blocked 

 Altering File Groups  No BLOCKING/LOCKING on User activity  You cannot Drop Data Files or Add new

Data Files while encrypting or decrypting

What Inherits Encryption Data Files  Log Files*  Database Snapshots  Database Backups (Full, Differential, Filegroup, and Transactional) 

*Virtual Log Files written before TDE is enabled will be unencrypted until they are overwritten.

Demo

Custom Certificate Management TDE Database  Master and Private Key Passwords  Certificates Managed through Maintenance Plan 

 Backup  Delete after 4 days



Save $$$$

Self Managing Certificates 

Don’t Over Complicate it  



Think of the current Backup Planning 





Certificates on servers with SAN and Recovery level will get replicated Certificates will also get swept to tape

Password Management  



Plan to keep a Copy of the Certificate and the Password on hand Adhere to best practices through Automation

Keep Passwords in an replicated SAN location, in a secure tool like Keypass Automate Master & Private Key password changes

Previous Experience 

1 Man shop, over 35 prod TDE servers, managed just fine with Keypass, SAN replication, And sweeping Certificates to Tape

References 



Jasper Smith SQL Server MVP blog New in SQL 2008 : Transparent Data Encryption Part I & II http://sqlblogcasts.com/blogs/sqldbatips/archive/2008/06/24/ new-in-sql-2008-transparent-data-encryption-overview.aspx Sung Hsueh Database Encryption in SQL Server 2008 Enterprise Edition http://msdn.microsoft.com/enus/library/cc278098(SQL.100).aspx

Questions

?

Transparent Data Encryption - The Lightnight Round.pdf ...

Currently a Sr. SQL DBA at Publix. MCITP SQL 2005 DBA, MCTS SQL 2008 DBA. Blog: http://www.SQLBalls.com. Twitter: @SQLBalls. Page 2 of 18 ...

508KB Sizes 0 Downloads 183 Views

Recommend Documents

Transparent Data Encryption - SQL Saturday 79.pdf
Transparent Data Encryption - SQL Saturday 79.pdf. Transparent Data Encryption - SQL Saturday 79.pdf. Open. Extract. Open with. Sign In. Main menu.

Data Encryption Techniques
his/her computer/ laptop is protected enough because of the anti-virus and router being used, but keeping ... AES has 10 rounds for 128-bit keys, 12 rounds for.

data encryption standard algorithm pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. data encryption ...

SAS Data Set Encryption Options - SAS Support
Feb 19, 2013 - 10. Encryption Is Not Security . .... NOTE: SAS (r) Proprietary Software 9.3 (TS1M2). Licensed to SAS ... The maximum record length was 10.

Download Transparent Data Mining for Big and Small ...
Download Transparent Data Mining for Big and. Small Data (Studies in Big Data) Full Books. Books detail. Title : Download Transparent Data Mining for Big q.

medical-data-encryption-101-white-paper.pdf
Whoops! There was a problem loading more pages. Main menu. Displaying medical-data-encryption-101-white-paper.pdf.

Encryption Whitepaper
As computers get better and faster, it becomes easier to ... Table 1 details what type of data is encrypted by each G Suite solution. 3. Google encrypts data as it is written to disk with a per-chunk encryption key that is associated .... We compleme

Making the cloud more transparent - Intel - Media13
CHALLENGES. • Understanding needs: When developing its new cloud brokerage service, a priority for. CompatibleOne was gaining a detailed understanding ...

Google Message Encryption
Google Message Encryption service, powered by Postini, provides on-demand message encryption for your organization to securely communicate with business partners and customers according to security policy or on an “as needed” basis. Without the c

an intelligent text data encryption and compression for ...
encryption provides the required security. Key words: Data compression, BWT, IDBE, Star Encoding,. Dictionary Based Encoding, Lossless. 1. RELATED WORK AND BACKGROUND. In the last decade, we have seen an unprecedented explosion of textual information

Making the cloud more transparent - Intel - Media13
Communications/Media. Cloud Security ... the right type of cloud resources based on a list of user-configurable criteria would fulfill .... All rights reserved. Intel ...

1.-THE-TRANSPARENT-BEDROOM.pdf
Chen, is an index of this enduring phenomenon, (taking cues from Vegas showgirls, trade. show hostesses, and school girl fantasies) in a format that participates in an infantile. theatricality, however flimsy and makeshift. Not only is the phenomenon

A Novel Scheme for Remote Data Storage - Dual Encryption - IJRIT
Abstract:- In recent years, cloud computing has become a major part of IT industry. It is envisioned as a next generation in It. every organizations and industries ...

medical-data-encryption-101-white-paper.pdf
Whoops! There was a problem loading more pages. medical-data-encryption-101-white-paper.pdf. medical-data-encryption-101-white-paper.pdf. Open. Extract.

A Novel Scheme for Remote Data Storage - Dual Encryption - IJRIT
stored in the cloud. By using the corresponding private key, the embedded data and the key can be extracted successfully from the cloud. This scheme ensures ...

Reaching transparent truth
Abstract. This paper presents and defends a way to add a transparent truth pred- icate to classical logic, such that T(A) and A are everywhere intersub- stitutable, where all T-biconditionals hold, and where truth can be made compositional. A key fea

Is Experience Transparent?
1/2, Selected Papers from the American Philosophical Association,. Pacific Division ... (2004) terms, describe this as a reductive representationalist account of phenomenal .... objects and qualities," but to my experience of them as well. And .....

Transparent and Opaque.pdf
Loading… Page 1. Whoops! There was a problem loading more pages. Transparent and Opaque.pdf. Transparent and Opaque.pdf. Open. Extract. Open with.

Improved Transparent Conducting Oxides Boost Performance ... - NREL
Today's thin-film solar cells could not function without transparent conducting oxides (TCOs). ... But a group of researchers at the National Renewable Energy.