Encryption in SQL Server

Slides:



Advertisements
Similar presentations
Chapter 7 HARDENING SERVERS.
Advertisements

Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Introducing TakeCharge SyncedTool The most secure, agile hosted file-sharing platform for business.
Oracle Database Security …from the application perspective Martin Nystrom September 2003.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
CRM in Education: Raising Standards. Saving Time. Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
#SQLSAT454 SQL Server 2016 New Security Features Gianluca
Overview of Security Investments in SQL Server 2016 and Azure SQL Database Jamey Johnston 1/15/2016Security Investments in SQL Server 2016 and Azure SQL.
Microsoft Advertising 16:9 Template Light Use the slides below to start the design of your presentation. Additional slides layouts (title slides, tile.
Secure SQL Database with TDE Thomas Chan SQL Saturday Raleigh.
SQL Server 2016 Security Features Marek Chmel Microsoft MVP: Data Platform Microsoft MCT: Regional Lead MCSE: Data Platform Certified Ethical Hacker.
Hacking Exposé Using SSL to Protect SQL Connections.
SQL Server Encryption Ben Miller Blog:
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
ORACLE's Approach ORALCE uses a proprietary mechanism for security. They user OLS.... ORACLE Labeling Security. They do data confidentiality They do adjudication.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
Defense In Depth: Minimizing the Risk of SQL Injection
ArcGIS for Server Security: Advanced
Microsoft Connect /23/ :39 PM
Azure SQL Database Updates
Microsoft Azure Virtual Machines
Securing SQL Server Processes with Certificates
Cloud BI with Azure Analysis Services
Data Virtualization Tutorial… SSL with CIS Web Data Sources
Recommended Practices & Fundamentals
SQL Server 2016 Security and Privacy Features
Hiding Data from Prying eyes: Using SQL Server 2016 Always Encrypted
Working at a Small-to-Medium Business or ISP – Chapter 8
Enterprise Row Level Security: SQL Server 2016 and Azure SQL DB
Securing Data with SQL Server 2016
Thank You! #sqlsatdnipro Denis
Using Azure Key Vault for Encrypting and Securing your Cloud Workloads
CAN A DATABASE REALLY BE SECURE?
6/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
6/19/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Who am I Hector Villafuerte
Planning an Effective Upgrade from SQL Server 2008
A Technical Overview of Microsoft® SQL Server™ 2005 High Availability Beta 2 Matthew Stephen IT Pro Evangelist (SQL Server)
Power BI Security Best Practices
Design Seamless Upgrades to SQL Server 2016 with Query Store
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Always Encrypted, Data Masking, Row Level Security
SQL Server 2016 Security Features
Security enhancements in SQL Server 2016
Encrypting Data within SQL Server
Introducing the SQL Server 2016 Query Store
Encryption Not just for the NSA anymore
Overview of Security Investments
Security Enhancements in SQL Server 2016
TechEd /24/2018 6:19 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Azure SQL DWH: Tips and Tricks for developers
Hidden gems of SQL Server 2016
Row Level Security in SQL Azure and in On Premise
End to End Security and Encryption in SQL Server
SQL Server Performance Tuning Nowadays
SQL Database on IoT devices could you? should you? would you?
Secure/Encrypt SQL Server Database With TDE
2/27/2019 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
SQL Server 2016 Security Features
Designing IIS Security (IIS – Internet Information Service)
Get data insights faster with Data Wrangling
SQL Like Languages in Azure IoT
We Need To Talk Security
Presentation transcript:

Encryption in SQL Server Michał Sadowski @SadowskiMichal Encryption in SQL Server

SQLSat Kyiv Team Yevhen Nedashkivskyi Alesya Zhuk Eugene Polonichko Oksana Borysenko Mykola Pobyivovk Oksana Tkach

Our Awesome Sponsors

Session will begin very soon :) Please complete the evaluation form from your pocket after the session. Your feedback will help us to improve future conferences and speakers will appreciate your feedback! Enjoy the conference!

Few words about me Based in Kraków, Poland Leader of Data Community (former Polish SQL Server User Group) Kraków chapter SQL Server Database Administrator in international corporation Microsoft Certified Professional since 2005, Microsoft Certified Solution Expert: Data Platform Interests: Disaster Recovery High availability

Agenda Introduction Data protection Access control Demo after each section Summary

Introduction Security concerns are not with the highest priority in early phase of company growth Database administrators (and also developers) are not interested in security… … till the first security incident related to data leak But then it can be too late Getting know all built-in features can significantly make our life easier (and secure our workplace) Starting from May 2018 EU introduces General Data Protection Regulation (http://www.eugdpr.org/key-changes.html)

Examples of data leak incidents Wonga (04.2017) –270k accounts Snapchat (04.2017) – 1,7M accounts Lynda.com (12.2016) – 55k accounts, possible 9,5M ClixSense (09.2016) – 6,6M accounts Yahoo (09.2016) – 500M accounts Dropbox (08.2016) – 68M accounts AshleyMadison (07.2015) – 37M accounts MySpace (05.2016) – 427M accounts HackingTeam (07.2015) – 400 GB documents JPMorganChase (10.2014) – 76M accounts Adobe (10.2013) – 38M accounts More information: http://www.informationisbeautiful.net/visualizations/worlds- biggest-data-breaches-hacks/

Data Protection Encryption in transit: Encryption at rest: Transport Layer Security (SSL/TLS) Encryption at rest: Backup encryption Transparent Data Encryption Cell level encryption Encryption in use (client side): Always Encrypted

Transport Layer Security / SSL Data sent through network is not encrypted in any manner Using well-known tools (e.g. Wireshark) you can eavesdrop transferred data Possible issues with certificate permissions Alternatively, IPSec can be used to encrypt traffic

DEMO #1 Transport Layer Security / SSL

Backup Encryption Available in SQL Server starting with version 2008 R2 Data is secured by database key and certificate To restore encrypted backup you need to have valid certificate used for encryption Encrypted backup secures data leakage from the backups outside of company Eliminates risk of introduction of changes to production system after restore of modified backup Alternatively, Encrypting File System or BitLocker can be used

DEMO #2 Backup Encryption

Transparent Data Encryption Encryption of single database tempdb is also encrypted Available in SQL Server 2008+ Caution: Bug in SQL Server 2016 DMV Backup compression It is not as secure as it looks: http://simonmcauliffe.com/technology/tde/

DEMO #3 Transparent Data Encryption

Cell level encryption Allows encrypting a column in a table with sensitive data like credit card numbers, SSN, etc. It is using symmetric key and certificate Administrator can see data in encrypted columns Data is encrypted on database level – sending through network in unencrypted form Available starting from SQL Server 2008

DEMO #4 Cell Level Encryption

Always Encrypted Designed to protect sensitive data such as credit card numbers, SSN, etc. Data is encrypted at the client application (requires .NET 4.6.2), before sending to database server Can be used in following scenarios: Third party company is hosting/managing our servers Client application is hosted on-premises, data stored in the cloud Both client application and database are in the cloud Introduced in SQL Server 2016

DEMO #5 ALways Encrypted

Control Access Database access: Application access: SQL Server authentication: Active Directory Granular permissions Application access: Row-Level Security Static Data Masking Dynamic Data Masking

Row-Level Security Control access at the row level based on query characteristics Two types of predicates: Filtering for SELECT, UPDATE and DELETE Blocking for write operations (AFTER INSERT, AFTER UPDATE, BEFORE UPDATE, BEFORE DELETE) Filtering does not protect against executing the query!

DEMO #6 Row-Level Security

Dynamic Data Masking Masking potentially sensitive data against users without required privileges Masking is applied on the results of the query Dynamic Data Masking is complimentary to other security features – should be used with e.g. Row-Level Security Sensitive for specially crafted attacks: SELECT ID, Name, Salary FROM Employees WHERE Salary > 99999 and Salary < 100001;

DEMO #7 Dynamic Data Masking

Summary SQL Server delivers many encryption features In highly complex environments, pay attention to all elements of data chain (e.g. SSL between servers, not only client facing) Blindly applied features gives false impression of security Using encryption pay attention to Disaster Recovery documentation (and of course test it!)

Resources: SSL: https://support.microsoft.com/en-us/help/316898 TDE: https://docs.microsoft.com/en-us/sql/relational-databases/security/encryption/transparent-data-encryption-tde Breaking TDE: http://simonmcauliffe.com/technology/tde/ Always Encrypted: https://docs.microsoft.com/en-us/sql/relational-databases/security/encryption/always-encrypted-database-engine RLS: https://docs.microsoft.com/en-us/sql/relational-databases/security/row-level-security DDM: https://docs.microsoft.com/en-us/sql/relational-databases/security/dynamic-data-masking

Questions?: michal.sadowski@hotmail.com @SadowskiMichal

Thank you!

Our Awesome Sponsors