17.07.2015 Views

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6 – Transparent Data Encryptionand the Master database certificate private key, prior to recovering thedatabase backup file.The database encryption key that is created in the user database, in which TDEhas been implemented, is included in the standard database backup. It is storedin the boot record of the database file so that it can be accessed and used todecrypt the user database.When the service master key and database master key are backed up, it isrecommended to store their backup files in a separate location from thedatabase files. This separation will ensure continued protection of the encrypteddata in the event that the database backup media is stolen or compromised.TDE and ReplicationIf the TDE-enabled database is part of a replication setup, the subscribingdatabase must also have TDE implemented. The data that is traveling betweenthe databases will be in plain text and is vulnerable to unauthorized disclosure.A method of encrypting connections, such as secure socket layers (SSL) orInternet protocol security (IPSec), is recommended.TDE and FileStream DataThe FILESTREAM data type stores large unstructured objects, such asdocuments and images, in an integrated physical file that is separate from thedatabase file. When TDE is implemented on a user database that containsFILESTREAM data, the filestream files remain unencrypted.Implementing TDEIn this section, we will implement TDE using the HomeLending database.Our TDE implementation, in comparison to cell-level encryption, will be verysimple. There are no modifications to the schema required, there are nopermissions that need to be granted to database users and roles in order to useTDE, and there are no additional database objects that must be created toperform the encryption and decryption methods.On the other hand, the person performing the implementation of TDE doesrequire specific permissions; namely CONTROL permissions on the Masterand HomeLending databases. It is recommended to perform this process whilethe database is not in use by other users.133

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!