Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.

18
Gavin Payne Transparent Data Encryption The Hows, Whys and Whens
  • date post

    20-Dec-2015
  • Category

    Documents

  • view

    221
  • download

    1

Transcript of Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.

Page 1: Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.

Gavin Payne

Transparent Data Encryption

The Hows, Whys and Whens

Page 2: Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.

• Introduction to Encryption

• SQL Server Encryption Concepts

• Transparent Data Encryption

• Demo

• Considerations

Introduction

60 minutes

Page 3: Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.

Gavin Payne

Solution Architect 3.5 yearsSQL Server DBA 10 years

SQL Bits 7SQL Server User GroupSQL Social

Blog http://blog.gavinpayneuk.comTwitter @GavinPayneUK

About Me

Page 4: Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.

• We all have information we want to hide from others

To save embarrassmentTo keep trade secrets secretTo comply with regulatory compliance (e.g. PCI-

DSS)To comply with legal requirements (e.g. DPA)

• However:

Some people might actively try and steal dataSome people might accidentally find it

Why Encrypt?

Page 5: Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.

• Plaintext

• Cipher

• Key

• Ciphertext

Simple Encryption ConceptsPlaintextABCDEF

CipherCiphertextNHYGFHLD

Key

PlaintextABCDEF

CipherCiphertextNHYGFHLD

Key

Page 6: Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.

• Symmetric encryption

Where the same key is used to encrypt AND decrypt

Very fast but requires secure transport of the key

• Asymmetric encryption

Public key encryptionDifferent keys are used to encrypt and decryptEither key on its own is useless

Common Encryption Terms

PUBLICPUBLIC PRIVATE

PUBLIC PRIVATEPRIVATE

Page 7: Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.

• Key

Must assume the cipher is known and available Key makes the execution of the cipher

unique

• Certificate

Confirms the owner of a public keyUsing a verifiable 3rd party digital

signature

Common Encryption Concepts

dhuiowe5 hvg5u84yv87905yv89y4789ny3v8924ytc79wdrnywgdrygsdfh

Page 8: Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.

Why Is Database Encryption Needed?

Page 9: Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.

Database Encryption Methods

Storage Hardware I/O controller encryption

File System EFS, BitLocker etc.

Database Physical Storage Transparent Data Encryption

Database Logical Storage SQL Server Column Encryption

Application Application Column Encryption

Page 10: Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.

• SQL Server has a large internal encryption hierarchy

• Very flexible and self-sufficient

• All manageable via T-SQL

• Can hook into external encryption hardware

• Make sure you understand how to backup/restore!

SQL Server Encryption

Page 11: Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.

• Common term also used by Oracle

• Transparent Data Encryption is new in SQL Server 2008

• Enterprise Edition only feature

• Designed to protect data against unauthorised access at rest (MDFs, LDFs and backups)

• You can steal my disks but not my data

What is TDE?

Page 12: Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.

• Turnkey database storage encryption tool

• Transparent to applications and code

• Operates at the IO level within SQL Server

• A slight performance overhead (approx 6%)

• As dev’s strive to reduce database IO the effect of encryption is also reduced

What is TDE?

Page 13: Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.

• Enterprise Edition feature suggests enterprise need

• Primarily financial services and healthcare

• But theft of any data is grabbing more headlines

• Delivers complete database storage encryption

• With a comprehensive management framework

When to use TDE

Page 14: Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.

• System/Service Master Key

• Database Master Key

• Server Certificate

• Database Encryption Key

TDE Components

Page 15: Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.

Demo

Page 16: Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.

• Backup SMK

• Create a new user database

• Create DMK, cert, DEK

• Encrypt

• DMVs

• Backup and then restore elsewhere

Demo Summary

Page 17: Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.

• Key and certificate management is crucial

• Backup compression benefits lost entirely

• Backup portability severely hampered

• IO overhead quoted at about 6%

• Tempdb gets encrypted for everyone

Things to be aware of

Page 18: Gavin Payne Transparent Data Encryption The Hows, Whys and Whens.

• Encryption is based upon ciphers and keys

• Nothing new in the database world

• Although such a turnkey and complete option is

• Key management within SQL Server is crucial

• Backups and tempdb get encrypted as well as

data

Summary