Monday, 31 October 2011

Transparent Data Encryption (TDE)


 Transparent Data Encryption (TDE)


You can take several precautions to help secure the database such as designing a secure system, encrypting confidential assets, and building a firewall around the database servers. However, in a scenario where the physical media (such as drives or backup tapes) are stolen, a malicious party can just restore or attach the database and browse the data. One solution is to encrypt the sensitive data in the database and protect the keys that are used to encrypt the data with a certificate. This prevents anyone without the keys from using the data, but this kind of protection must be planned in advance.
Transparent data encryption (TDE) performs real-time I/O encryption and decryption of the data and log files. The encryption uses a database encryption key (DEK), which is stored in the database boot record for availability during recovery. The DEK is a symmetric key secured by using a certificate stored in the master database of the server or an asymmetric key protected by an EKM module. TDE protects data "at rest", meaning the data and log files. It provides the ability to comply with many laws, regulations, and guidelines established in various industries. This enables software developers to encrypt data by using AES and 3DES encryption algorithms without changing existing applications.
Important noteImportant
TDE does not provide encryption across communication channels. For more information about how to encrypt data across communication channels, see Encrypting Connections to SQL Server.
After it is secured, the database can be restored by using the correct certificate. For more information about certificates, see SQL Server Certificates and Asymmetric Keys.

Source:

http://msdn.microsoft.com/en-us/library/bb934049.aspx


1 comment:

  1. Nice post. This article helped me to learn so much about data encryption. As I am studying about electronic signature I will do visit the link shared to learn about server certificates and asymmetric keys.
    electronic signature

    ReplyDelete