SQL Server Encryption Ben Miller Blog:

Slides:



Advertisements
Similar presentations
SQL Server 2005 RDBMS Technical Overview Matthew Stephen IT Pro Evangelist (SQL Server) Microsoft Ltd.
Advertisements

Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Vinod Kumar M MTC – Technology Specialist Level: 300.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Principles of Information Security, 2nd edition1 Cryptography.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Ho Ting Chung, Zeturl ( ) 1.  Authentication  Encryption 2.
Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
15 Copyright © 2006, Oracle. All rights reserved. Database Security.
File System and Full Volume Encryption Sachin Patel CSE 590TU 3/9/2006.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
Overview SQL Server 2008 Overview Presented by Tarek Ghazali IT Technical Specialist Microsoft SQL Server MVP, MCTS Microsoft Web Development MCP ITIL.
Security & Auditing on SQL Server 2008 R2 Antonios Chatzipavlis Software Architect Evangelist, IT Consultant MCT, MCITP, MCPD, MCSD, MCDBA, MCSA, MCTS,
Introduction to SQL 2005 Security Nick Ward SQL Server Specialist Nick Ward SQL Server Specialist
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
Data Management Conference Data Security for Audit and Compliance Terry Room Architect, Microsoft Ltd London September 29th.
Week #7 Objectives: Secure Windows 7 Desktop
Cao Tiến Đức. Outline What is TDE How TDE works Basic TDE operations Tablespace encryption HSM Reference.
Roy Ernest Database Administrator Pinnacle Sports Worldwide SQL Server 2008 Transparent Data Encryption.
Sagar Joshi Senior Security Consultant | ACE Team, Microsoft Information Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Chapter 6 : Designing SQL Server Service-Level Security MCITP Administrator: Microsoft SQL Server 2005 Database Server Infrastructure Design Study Guide.
DATABASE MIRRORING  Mirroring is mainly implemented for increasing the database availability.  Is configured on a Database level.  Mainly involves two.
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
Security David Frommer Principal Architect Business Intelligence Microsoft Partner of the Year 2005 & 2007.
Additional Security Tools Lesson 15. Skills Matrix.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Course Topics Administering SQL Server 2012 Jump Start 01 | Install and Configure SQL Server04 | Manage Data 02 | Maintain Instances and Databases05 |
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Transparent Data Encryption
April 10, Platinum and Gold Partners Data Encryption and Key Management in SQL Said Salomon Database Administrator Unitrin Direct Insurance.
Module 5: Upgrading to SQL Server 7.0. Overview Planning an Upgrade Preparing to Upgrade Verifying the Upgrade Setting a Compatibility Level.
CSCI 3140 Module 6 – Database Security Theodore Chiasson Dalhousie University.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
SharePoint enhancements through SQL Server RSS integration with SharePoint What’s New Elimination of IIS
Security-Enhanced Database Platform. Agenda  Business challenges and needs  SQL Server 2008 features  Trustworthy computing  Surface Area Reduction.
Creating and Managing Digital Certificates Chapter Eleven.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
System Security: Cryptography Technologies CPE Operating Systems
Secure Data Access with SQL Server 2005 Doug Rees Associate Technologist, CM Group
C Copyright © 2007, Oracle. All rights reserved. Security New Features.
The Encryption Primer Steve Jones Editor SQLServerCentral.
March 7, 2013 SQL Encryption and You By Todd Kleinhans
Building Defense in Depth using the Full Spectrum of SQL Server Encryption.
Over 18 yrs experience with SQL Server
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the importance of security and encryption. Objective Course Weight 2%
Secure SQL Database with TDE Thomas Chan SQL Saturday Raleigh.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
SQL Server 2016 Security Features Marek Chmel Microsoft MVP: Data Platform Microsoft MCT: Regional Lead MCSE: Data Platform Certified Ethical Hacker.
The Spy who loathed me An Introduction to SQL Security.
ORACLE's Approach ORALCE uses a proprietary mechanism for security. They user OLS.... ORACLE Labeling Security. They do data confidentiality They do adjudication.
UNM Encryption Services in Development
Partial Database Availability
Chapter 5 : Designing Windows Server-Level Security Processes
A Technical Overview of Microsoft® SQL Server™ 2005 Beta 2
Planning an Effective Upgrade from SQL Server 2008
Contained DB? Did it do something wrong?
Designing Database Solutions for SQL Server
Transparent Data Encryption (TDE)
Encryption Not just for the NSA anymore
dbatools - PowerShell and SQL Server Working Together
or: How I Learned to Stop Using EXECUTE AS and Love Certificates
End to End Security and Encryption in SQL Server
Secure/Encrypt SQL Server Database With TDE
Governing Your Enterprise with Policy-Based Management
Building Defense in Depth using the Full Spectrum of SQL Server Encryption Michael Keleher Database Administrator Hays Consultant at PwC.
We Need To Talk Security
Presentation transcript:

SQL Server Encryption Ben Miller Blog:

Introduction  Using SQL Server since version 4.2  SQL Server MCM  SQL Server MVP  Been in IT for over 25 years  Automation and Integration are specialties  MCAD: C# and Web Development  MCSE: Data Platform

Agenda  Encryption Hierarchy  Keys  Symmetric Keys  Asymmetric Keys  Database Encryption Key  Certificates  TDE  Encrypted Backup  Cell Encryption

Encryption Hierarchy

Encryption Keys  Symmetric Keys  Do not use RC4 and RC4_128 algorithms  Symmetric keys created with ALGORITHM = TRIPLE_DES_3KEY use TRIPLE DES with a 192-bit key.  Symmetric keys created with ALGORITHM = TRIPLE_DES use TRIPLE DES with a 128-bit key.  Assymmetric Keys  Only Windows logins, SQL Server logins, and application roles can own asymmetric keys. Groups and roles cannot own asymmetric keys  This is a Key Pair and Encrypted by Master Key or Password or EKM Provider  Can be RSA_512, RSA_1024, RSA_2048

Encryption Keys (2)  Database Encryption Key  Special Symmetric key used in TDE  Notes:  You should SALT the values on encryption so that comparisons or replacement hacks cannot take place.  For best performance, encrypt data using symmetric keys instead of certificates or asymmetric keys  Database master keys are protected by the Service Master Key  An Extensible Key Management (EKM) module holds symmetric or asymmetric keys outside of SQL Server  The Service Master Key and all Database Master Keys are symmetric keys

What is TDE?  Transparent Data Encryption  Encrypted Database “At Rest”  Encryption with AES or 3DES algorithms  AES_128, AES_192, AES_256, TRIPLE_DES_3KEY  Encryption is performed at the Page Level  Data and Log files  When one database is encrypted, tempdb is encrypted by default.  FILESTREAM data is not encrypted when TDE is enabled

Requirements for TDE - Review  SQL Server 2008/2012/2014 Enterprise Edition  Master database – Master Key  Master database – Certificate  User database – Database Encryption Key  Stored in the boot record of database for recovery  ALTER DATABASE SET ENCRYPTION ON

Benefits of TDE  No schema changes like cell level encryption  Page Level encryption  MSFT estimates degradation at 3-5% instead of 20-28% with cell level encryption **  Secure backups by default  Invisible to the User  “At Rest” Encryption

Disadvantages of TDE  Backup Compression no longer effective  Enterprise Edition required  With Cell Level encryption you have finer control over encrypted elements  With one database encrypted, TempDB is encrypted for ALL databases  Even when all DBs are decrypted, Server Restart required to remove encryption from TempDB

Backup Encryption  Requirements  Certificate or Asymmetric Key in EKM Provider  New Media Set  Backup Compression still effective

Show me the money! Demo

System DMVs for Encryption  sys.key_encryptions  sys.symmetric_keys  sys.certificates  sys.dm_database_encryption_keys  sys.asymmetric_keys

Things to watch for…  BACKUP database before enabling TDE  You are allowed to drop a certificate in the hierarchy used for TDE **  BACKUP all Certificates and Private Keys  BACKUP all Keys for safe keeping  In Mirroring and Replication, both databases are encrypted  ** Prior to SQL 2008 R2 SP2 you can drop the certificate because there is no dependency held.

Ticking Time Bombs  Certificates can be dropped (pre SQL 2008R2 SP2) even if TDE is enabled on a database.  Database will still function when certificate is dropped until restart. Ensure you have a backup.

Summary  Only available in Enterprise Edition  TDE is enabled via Keys and Certificates  Data is encrypted “At Rest” not over the wire  Backups of Encrypted database are encrypted  Protect your Encryption assets (Keys, Certificates, etc)

Resources  SQL PASS (  SQL Saturday in your area (sqlsaturday.com)  SQL Server User Groups in your area  Microsoft SQL Server website   SSWUG.org 

Contact Ben Miller Blog: