17.07.2015 Views

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6 – Transparent Data EncryptionGONOREWIND,NOUNLOAD,STATS = 10Listing 6-9: Backing up the HomeLending database after TDE is implemented.The next step is to compare the contents of the pre-TDE and post-TDE backupfiles, by opening both files up in a simple text editor such as Notepad, Wordpador Textpad. We can perform a search within the pre-TDE backup file for theplain text of a known sensitive data value. For example, we will search for thevalue of "319726 Rocky Fabien Avenue" which is contained in theBorrower_Address table in the HomeLending database.This search reveals the searched value in plain text, as shown in Figure 6-2. Inaddition, if you were to manually scan through the backup file, you would findthat the metadata of our database objects, such as tables, views, storedprocedures and user defined functions are revealed in plain text.Figure 6-2: Backup File – Unencrypted.The same search on our post-TDE backup file will result in the message boxshown in Figure 6-3, stating that it cannot find the requested value. This isbecause the entire backup file, including the metadata of our database objects,has been encrypted and no longer contains any plain text values.141

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!