Encryption
Encryption
SQL Server
Robert Stewart
Last Updated:
August 18, 2020
Encryption
Course:
SQL710
Encryption
Protecting your data from illegal access should be a TOP priority for any DBA in today’s
environment. Implementing a firewall and access privileges are not sufficient to protect your data.
As can be seen from the daily news of data breaches from companies around the world it is
imperative to protect the data from illegal breaches that occur from behind the firewall.
Encryption
A multi tier approach to security is needed – Firewalls, User Privileges, Physical Access, and
Encryption (database level, transmission level, and backups).
Encryption at Rest
Database Level Encryption – Transparent Data Encryption
As a result, when you restore these backups, the certificate protecting the database encryption key
must be available.
Encryption
TDE This means that in addition to backing up the database, you have to make sure that you maintain
backups of the server certificates to prevent data loss.
• client can validate the server’s identity by using the server’s certificate
o can be obtained from a certificate authority (CA)
o or Windows Server can create the certificate
Encryption these self signed certificates are not as secure as a CA and should not be used on
SSL/TLS publicly exposed databases
• name of the certificate must be the fully qualified domain name (FQDN) of the computer
• Certificates are stored locally for the users on the client computer
• client must be able to verify the ownership of the certificate used by the server
• An extra network roundtrip is required at connect time
• Packets sent from the application to the instance of SQL Server must be encrypted by
the client TLS stack and decrypted by the server TLS stack
Encryption
SSL/TLS • Packets sent from the instance of SQL Server to the application must be encrypted by
the server TLS stack and decrypted by the client TLS stack
• SQL Server also supports Internet Protocol Security (IPSec)
• is more secure