April 10, 2010. Platinum and Gold Partners Data Encryption and Key Management in SQL Said Salomon Database Administrator Unitrin Direct Insurance.

Slides:



Advertisements
Similar presentations
Invoice Management Software Developed by Morbadevi Softwares Morbadevi Softwares®2014, All Rights Reserved.
Advertisements

Conventional Encryption: Algorithms
Enkripsi dan Dekripsi Data
II.I Selected Database Issues: 1 - SecuritySlide 1/20 II. Selected Database Issues Part 1: Security Lecture 2 Lecturer: Chris Clack 3C13/D6.
Oracle Database Security
Said Salomon Unitrin Direct Insurance T-SQL Aggregate Functions Said Salomon.
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
15 Copyright © 2006, Oracle. All rights reserved. Database Security.
Chapter 19 Security.
Managing the Data SQL Overview. Client\Server RDMS (relational database management system) Client\Server RDMS (relational database management system)
An Encryption Primer Steve Jones Editor in Chief SQLServerCentral.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.
MCTS: Pass one of 24 exams (a few require more). Multiple counters are and You can also choose.
Database Key Management CSCI 5857: Encoding and Encryption.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
Said Salomon  I has over 25 year experience as an Information Technology Professional. He has a vast array of abilities.
Using cryptography to protect data in networks. Summary National Taras Shevchenko University of Kiev Ukraine Vsevolod Ievgiienko.
Roy Ernest Database Administrator Pinnacle Sports Worldwide SQL Server 2008 Transparent Data Encryption.
Said Salomon Unitrin Direct Insurance T-SQL Date and Time Functions Said Salomon.
Crypto Bro Rigby. History
DATABASE MIRRORING  Mirroring is mainly implemented for increasing the database availability.  Is configured on a Database level.  Mainly involves two.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Additional Security Tools Lesson 15. Skills Matrix.
Types of Electronic Infection
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Transparent Data Encryption
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Said Salomon Unitrin Direct Insurance T-SQL for Beginners Said Salomon CODE CAMP
System Security: Cryptography Technologies CPE Operating Systems
Database Security and Data Protection Suseel Pachalla, CISSP.
Chapter 8Oracle9i DBA II: Backup/Recovery and Network Administration 1 Chapter 8 Complete Recovery with Recovery Manager.
CSCI 3140 Module 6 – Database Security Theodore Chiasson Dalhousie University.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
Ln Lou Modern Cyphers. 0. Security System Key Plain Text Cipher Text Encryption (K × P → C) Decryption (K × C → P)
Creating Custom Reports
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Backing Up and Restoring Databases by Using the SQL Server 2000.
Module 11: Managing Data Storage. Overview Managing File Compression Configuring File Encryption Configuring EFS Recovery Agents Implementing Disk Quotas.
April 20023CSG11 Electronic Commerce Encryption John Wordsworth Department of Computer Science The University of Reading Room.
System Security: Cryptography Technologies CPE Operating Systems
Encryption Name : Maryam Mohammed Alshami ID:H
Said Salomon Unitrin Direct Insurance T-SQL Avoiding cursors Said Salomon.
C Copyright © 2007, Oracle. All rights reserved. Security New Features.
The Encryption Primer Steve Jones Editor SQLServerCentral.
CS4241: Webware Class 25: A Few Short Topics Web Security 1 Copyright , Michael J. Ciaraldi.
Building Defense in Depth using the Full Spectrum of SQL Server Encryption.
Secure SQL Database with TDE Thomas Chan SQL Saturday Raleigh.
Wharton Computer Consulting, Inc. PowerShell Basics for SQL Server One Tool to Manage All SQL Servers Michael Wharton
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
SQL Server.  logins/users  roles  certificate  assymetric key 
SQL Server Encryption Ben Miller Blog:
ORACLE's Approach ORALCE uses a proprietary mechanism for security. They user OLS.... ORACLE Labeling Security. They do data confidentiality They do adjudication.
Microsoft dynamics Axapta training institute Contact US: Magnific training
To Encrypt or Not Encrypt
Amazon Web Services RDS with SQL Server
Amazon Web Services RDS with SQL Server
Securing Data with SQL Server 2016
Chapter 5 : Designing Windows Server-Level Security Processes
2017 Microsoft Exam.
Common Security Mistakes
Amazon Web Services RDS with SQL Server
Amazon Web Services RDS with SQL Server
Amazon Web Services RDS with SQL Server
Building Defense in Depth using the Full Spectrum of SQL Server Encryption Michael Keleher Database Administrator Hays Consultant at PwC.
Amazon Web Services RDS with SQL Server
Presentation transcript:

April 10, 2010

Platinum and Gold Partners

Data Encryption and Key Management in SQL Said Salomon Database Administrator Unitrin Direct Insurance

Who am I?  I has over 25 year experience as an Information Technology Professional. He has a vast array of abilities in the field in the areas of Network, Desktop Support, DBA, Staff Project Management, Application Software Development, Business Analysis and Quality Assurance. I have Microsoft certifications as a MCTS, MCPS, and MCNPS, and multiple certifications from the Insurance Institute of America. Current Said is a DBA at Unitrin Direct Insurance.

SQL Key Management Overview

2008 Key Management Overview

Service Master Key  One per server instance  Backup  Restore  Alter  Is automatically generated when needed  There is not create command for Service Master Key

Database Master Key  One per database  Is encrypted by the server master key and the password used when created.

Certificate  Can have as many as need  Is encrypted by the database master key as well as the password use on the certificate

Asymmetric key  Why?  Public key  Private key  No backup  Poor performance (100 x)

Symmetric key  Can have as many as needed  Is encrypted by the Certificate or Asymmetric key or Symmetric key or password  Algorithms DES | TRIPLE_DES | TRIPLE_DES_3KEY | RC2 | RC4 | RC4_128 | DESX | AES_128 | AES_192 | AES_256  No Backup

Symmetric Functions  EncryptByKey  DecryptByKey  EncryptByPassPhrase  DecryptByPassPhrase  Key_ID  Key_GUID

Asymmetric Functions  EncryptByAsmKey  DecryptByAsmKey  EncryptByCert  DecryptByCert  Cert_ID  AsymKey_ID  CertProperty

SQL Encryption Step-by-Step

Backup Service Master Key  BACKUP SERVICE MASTER KEY TO FILE = 'path_to_file' ENCRYPTION BY PASSWORD = 'password'

Restore Service Master Key  RESTORE SERVICE MASTER KEY FROM FILE = 'path_to_file' DECRYPTION BY PASSWORD = 'password' [FORCE]

Create (Database) Master Key  CREATE MASTER KEY ENCRYPTION BY PASSWORD = 'password'

Backup (Database) Master Key  BACKUP MASTER KEY TO FILE = 'path_to_file' ENCRYPTION BY PASSWORD = 'password'

Restore (Database) Master Key  RESTORE MASTER KEY FROM FILE = 'path_to_file' DECRYPTION BY PASSWORD = 'password' ENCRYPTION BY PASSWORD = 'password' [ FORCE ]

Sharing a symmetric key  CREATE SYMMETRIC KEY test_aes128_key WITH KEY_SOURCE = 'I am the very model of a modern major general', IDENTITY_VALUE = 'E pluribus unum', ALGORITHM = AES_128 ENCRYPTION BY PASSWORD =

Transparent Data Encryption (2008 only)

Please complete the online evaluation form

Resources  SQL 2005 Symmetric Encryption By Michael Coles  My web site  My Twitter SaidSalomon