17.07.2015 Views

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

5 – Cell-Level EncryptionPreparing for Cell-Level EncryptionUsing the HomeLending database, we will implement cell-level encryption.For simplicity and clarity we will focus on the Borrower_Identificationtable. The majority of the steps noted in this demonstration would be repeatedas needed for each column in any table that contains data classified as "High"sensitivity.Before we begin, we will need to examine our database and generate therequirements that will guide our approach to implementing cell-levelencryption.Reviewing the Borrower_Identification TableThe Borrower_Identification table contains references to a borrower'svarious forms of identification, such as Security Number, Driver's LicenseNumber and Unique Tax Identification Number.Figure 5-2: Borrower_Identification table.The columns defined in this table are as follows:• Borrower_Identification_ID: The primary key, containing an integervalue that uniquely identifies each row.Sensitivity class: medium, due to our defined default class.• Borrower_ID: An integer value; this is the foreign key, relating torows contained within the Borrower table.Sensitivity class: medium, due to our defined default class.105

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!