Over 18 yrs experience with SQL Server

Slides:



Advertisements
Similar presentations
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Advertisements

Use of a One-Way Hash without a Salt
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Password Cracking Lesson 10. Why crack passwords?
Simple and Secure Approach to Discovery at the Desktop.
Database Management System
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Apr 30, 2002Mårten Trolin1 Previous lecture – passwords Passwords for authentication –Storing hashed passwords –Use of salt Passwords for key generation.
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
Apr 4, 2003Mårten Trolin1 Previous lecture TLS details –Phases Handshake Securing messages –What the messages contain –Authentication.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
Building Highly Available Systems with SQL Server™ 2005 Vineet Gupta Evangelist – Data and Integration Microsoft Corp.
Module 1: Installing Active Directory Domain Services
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
Staying Safe Online Keep your Information Secure.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Howard Pincham, MCITP, CISSP Database and Compliance Engineer Hyland Software, Inc.
Bezpečnost Windows pro pokročilé: uživatelské účty GOPAS: | | Ing. Ondřej Ševeček | GOPAS a.s. |
Cao Tiến Đức. Outline What is TDE How TDE works Basic TDE operations Tablespace encryption HSM Reference.
Roy Ernest Database Administrator Pinnacle Sports Worldwide SQL Server 2008 Transparent Data Encryption.
Dan Johnson. What is a hashing function? Fingerprint for a given piece of data Typically generated by a mathematical algorithm Produces a fixed length.
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
Databases and security continued CMSC 461 Michael Wilson.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
DATABASE MIRRORING  Mirroring is mainly implemented for increasing the database availability.  Is configured on a Database level.  Mainly involves two.
Protect Your Data's Privacy! Data Encryption with SQL Server Joe
SEC835 Practical aspects of security implementation Part 1.
Data and its manifestations. Storage and Retrieval techniques.
Authentication Key HMAC(MK, “auth”) Server Encryption Key HMAC(MK, “server_enc”) User Password Master Key (MK) Client Encryption Key HMAC(MK, “client_enc”)
Additional Security Tools Lesson 15. Skills Matrix.
Case Study II: A Web Server CSCI 8710 September 30 th, 2008.
Types of Electronic Infection
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Advanced Windows 8 Apps Using JavaScript Jump Start Exam Prep M5: Data, Files, and Encryption Michael Palermo Microsoft Technical Evangelist Jeremy.
Securing Your ASP.NET Application Presented by: Rob Bagby Developer Evangelist Microsoft ( )
6fb52297e004844aa81be d50cc3545bc Hashing!. Hashing  Group Activity 1:  Take the message you were given, and create your own version of hashing.  You.
Free Cookies and Other Security and Privacy Issues.
Network Security & Accounting
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Ethical Hacking: Defeating Logon Passwords. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
C Copyright © 2007, Oracle. All rights reserved. Security New Features.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Product Training 1 JetFlash Software Application.
Computer Security Sample security policy Dr Alexei Vernitski.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Secure SQL Database with TDE Thomas Chan SQL Saturday Raleigh.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
AGENDA 1.Importance of backups and backup strategy 2.Full DB backup and Restore 3.Filegroup Backup and restore 4.File Backup and Restore 5.Page restore.
SQL Server Encryption Ben Miller Blog:
ORACLE's Approach ORALCE uses a proprietary mechanism for security. They user OLS.... ORACLE Labeling Security. They do data confidentiality They do adjudication.
Identity Finder Client
Partial Database Availability
Recommended Practices & Fundamentals
Tutorial on Creating Certificates SSH Kerberos
Chapter 5 : Designing Windows Server-Level Security Processes
Password Cracking Lesson 10.
Mike Furgal Director – DB and Pro2 Services March 20th, 2017
Business Risks of Insecure Networks
Tutorial on Creating Certificates SSH Kerberos
Get Started with Pearson Mastering Physics*
Chapter 27: System Security
End to End Security and Encryption in SQL Server
Secure/Encrypt SQL Server Database With TDE
Exercise: Hashing, Password security, And File Integrity
AWS S3 Cloud Backup Licensing per system Starting at $79 per year.
Presentation transcript:

Over 18 yrs experience with SQL Server Who am I? Founder of WaterOx Consulting – Remote DBA Services and SQL Server Consulting. Over 18 yrs experience with SQL Server Member of: PASS, Toastmasters, Data Management international and a Microsoft partner & Bizspark (someone at MS thinks I have a good idea) Member of the data werewolves on Linked in Comic from Dilbert.com

Agenda Scenarios of data exposure Data in transit vs. Data at rest Discuss personal experience Hash or Encryption – How to choose? Demo #1 Discuss how to improve Demo #2 Final summary and questions http://reedbookmanreunion.com/images/agenda.jpg

50 million users may have been compromised Name, email, address, “encrypted” passwords April 2013 – Just a couple of weeks ago Salted hashed passwords using SHA1 algorithm. SHA1 was found to not be truly secure in 2005, Living Social began in 2007.

4.7 million SSN 3.3 million bank account #s Oct 2012 - SC Dept of Revenue announces that 4.7million SSNS of tax filers and dependents stolen - Compliant with IRS rules.

Data at rest is not required to be encrypted “While encryption of data at rest is an effective defense-in-depth technique, encryption is not currently required for FTI (Federal Tax Information) while it resides on a system (e.g., in files or in a database) that is dedicated to receiving, processing, storing or transmitting FTI, is configured in accordance with the IRS Safeguards Computer Security Evaluation Matrix (SCSEM) recommendations and is physically secure restricted area behind two locked barriers. This type of encryption is being evaluated by the IRS as a potential policy update in the next revision of the Publication 1075.” “While encryption of data at rest is an effective defense-in-depth technique, encryption is not currently required for FTI (Federal Tax Information) while it resides on a system (e.g., in files or in a database) that is dedicated to receiving, processing, storing or transmitting FTI, is configured in accordance with the IRS Safeguards Computer Security Evaluation Matrix (SCSEM) recommendations and is physically secure restricted area behind two locked barriers. This type of encryption is being evaluated by the IRS as a potential policy update in the next revision of the Publication 1075.” Data at rest is not required to be encrypted http://www.irs.gov/uac/Encryption-Requirements-of-IRS-Publication-1075

94 million credit cards Dec 2006 Due to lack of firewalls and weak encryption Hard to grasp the extent of the data exposed

If everyone in the USA had 1 credit card – that would be 1 in 3 people who’s card number was exposed.

Why bother to encypt data at rest?

Data in Transit Data in transit Thousands of prospectors panning for gold in a fast flowing river

Data at Rest Corporate DB = Mountains of data gold in one location. How much confidential information do you have at work” Credt cards Ssns Confidential employee data Contracts Purchase orders Medical records financials

Just because there is a fence, doesn’t mean you’re safe Just because you lock the gate doesn’t mean you are safe http://www.petapixel.com/assets/uploads/2009/12/Storybook-Wolf-by-Jose-Lu-0011.jpg

Change is coming As mentioned earlier, change is coming Need to prepare for the upcoming storm

Data at object level had to be protected Had to be able to decrypt the value No change to existing application code, SQL code ok Minimal Impact on performance http://www.thephatstartup.com/wp-content/uploads/2012/08/dont-worry-i-got-this.jpg http://shawnram.files.wordpress.com/2010/10/criteria1.jpg

http://www. thephatstartup http://www.thephatstartup.com/wp-content/uploads/2012/08/dont-worry-i-got-this.jpg http://www.thephatstartup.com/wp-content/uploads/2012/08/dont-worry-i-got-this.jpg

What method?

Transparent Data Encryption? Does: Encrypt the MDF and LDF files via symmetric key Encrypt files and trans log for log shipped / mirrored Affect performance since tempdb is encrypted too Does not: encrypt data at the object level. support instant file initialization for database files. interact well with backup compression. encrypt read only filegroups. encrypt databases used in replication topologies. encrypt filestream data. does encrypt the data "At rest", the actual files themselves are encrypted via a symmetric database encryption key usually protected by an asymmetric key or a certificate. encrypt database files (data and log) and transaction log records for log shipped and mirrored databases. affect performance for non encrypted databases on the same instance due to addition of the encrypted TempDB.

Data at object level had to be protected Had to be able to decrypt the value No change to existing application code, SQL code ok Minimal Impact on performance http://www.thephatstartup.com/wp-content/uploads/2012/08/dont-worry-i-got-this.jpg http://shawnram.files.wordpress.com/2010/10/criteria1.jpg

Hashing is taking a variable length string and ‘hashing’ it to a fixed length of gibberish consistently. Always will hash to the same value Some things to be aware of when hashing HASH!! http://www.thesouthinmymouth.com/wp-content/uploads/2012/01/corned-beef-hash.jpg

Salt your Hashes Salting a hash means adding a value in it to make attacks by hackers harder for them. http://www.f1online.pro/en/image-details/4832529.html

There is no ‘unhashing’ a value if you need it later Hashing is 1 way only. There is no ‘unhashing’ a value if you need it later (ex report, membership card, etc) http://kingdombard.files.wordpress.com/2010/06/one_way_by_cellogirl19.jpg

Collisions Hashing does run the risk of ‘collisions’ Times where the hashed values for 2 totally different values comes out the same. Rainbow tables to crack values, etc. Hashing is like baking bread Flour water yeast + baking (algorithm) = bread 2 cup flour 1 TBSP yeast vs 1.9 cup flour + .9 TBSP yeast You can’t tell what made the bread, look the same, taste the same Can’t undo Hashing not an option in my situation

Data at object level had to be protected Had to be able to decrypt the value No change to existing application code, SQL code ok Minimal Impact on performance http://www.thephatstartup.com/wp-content/uploads/2012/08/dont-worry-i-got-this.jpg http://shawnram.files.wordpress.com/2010/10/criteria1.jpg

Encryption Pretty powerful and complex Non-determinite Different everytime you encrypt the value (non-deterministic) The keys are what make it possible

Encryption goes both ways – encrypt and decrypt Can easily get the values so long as I have access to the keys

http://www. swiss-banking-antiques http://www.swiss-banking-antiques.com/images/bbposte60mmperspective-750.png http://cdn.zmescience.com/wp-content/uploads/2012/12/fresh-sliced-bread.jpg

DEMO Show values – search on encrypted Show table scan, then index scan

Data at object level had to be protected Had to be able to decrypt the value No change to existing application code, SQL code ok Minimal Impact on performance http://www.thephatstartup.com/wp-content/uploads/2012/08/dont-worry-i-got-this.jpg http://shawnram.files.wordpress.com/2010/10/criteria1.jpg

Options? What options do we have? http://www.miamism.com/wp-content/uploads/m/blogs/miamism/options.jpg

xxx-xx-1287 Common practice to expose part of the data being searched ‘Partial Plaintext Value’ Ex: last 4 of SSN issue: I have given part of the encrypted value to anyone that gets a hold of my data. They look for that pattern to get a subset to then focus on Reduce time and effort to then crack the cipher

Hash Grouping Generate a value From a hash algorithm and store only the end result value. Don’t want to store the hash – why bother to encrypt unless to undo – overkill and overwork “Simplify” We know the hashing is deterministic – take that value, divide it to get a grouping value, then store that. Gives no hint what-so-ever to the actual hashed value - Create index on the hashgroup value http://kennybriscoe.com/wp-content/uploads/2011/02/lightbulb-idea.jpg

Data at object level had to be protected Had to be able to decrypt the value No change to existing application code, SQL code ok Minimal Impact on performance http://www.thephatstartup.com/wp-content/uploads/2012/08/dont-worry-i-got-this.jpg http://shawnram.files.wordpress.com/2010/10/criteria1.jpg

SUCCESS! http://www.smallbiztechnology.com/wp-content/uploads/2012/12/success.jpg

No Perfect Solution New GPU systems crack 14 character passwords in about 6 minutes Potential breaking times of various Hash Algorithms: SHA1: 63G / sec LM: 20G / sec Bcrypt: 71k /sec *Not been able to find stats for AES_256 (SQL Encryption) because no one is really bothering to try True encryption hacking in a reasonable amount of time would require quantum computers, not readily available to hackers. http://www.club-3d.com/tl_files/club3d/uploads/en/content/Technology/AMD/CrossFireX/3waycrossfire.png

Brace Yourselves Change is coming. True encryption hacking in a reasonable anount of time would require quantum computers, not readily available to hackers. http://imgix.8tracks.com/mix_covers/000/593/175/94743.original.jpg?fm=jpg&q=65&sharp=15&vib=10&w=521&h=521&fit=crop

@CBELLDBA Chris@WaterOxConsulting.com www.WaterOxConsulting.com How to contact me Image by: Master isolated images on www.freedigitalphotos.net