SlideShare ist ein Scribd-Unternehmen logo
1 von 38
SQLCAT ‐ Data and Admin
Security
Il-Sung Lee, Senior Program Manager
Denny Lee, Senior Program Manager
Ayad Shammout, Caregroup Healthcare
PASS Community Summit 2008
November 18 – 21, 2008 Seattle WA
SQL Server Customer Advisory Team
(SQLCAT)
 Works on the largest, most complex SQL Server projects worldwide
– US: NASDAQ, Progressive, Premier Bankcard, Hilton Hotels
– Europe: Barclays Capital, Danske Bank, McLaren, Bwin
– Asia/Pacific: Korea Telecom, GMarket, Japan Railways East, China
Mobile
– LATAM: Banco Itau, Oi
– Strategic ISVs: SAP, Siebel, JDE, PeopleSoft, GE Healthcare, SunGard,
Siemens, Dynamics and more
 Drives product requirements back into SQL Server from our customers
and ISVs
 Shares deep technical content with SQL Server community
– SQLCAT.com
– http://blogs.msdn.com/sqlcat
– http://blogs.msdn.com/mssqlisv
– http://technet.microsoft.com/en-us/sqlserver/bb331794.aspx
2PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security
SQL Server Design Win Program
 Target the Most Challenging and Innovative
Applications on SQL Server
 Investing in Large Scale, Referenceable SQL Server
Projects Across the World
– Provide SQLCAT technical & project experience
– Conduct architecture and design reviews covering performance,
operation, scalability and availability aspects
– Offer use of HW lab in Redmond with direct access to SQL
Server development team
 Work with Marketing Team Developing Case Studies
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 3
AGENDA
 SQL Server 2008 Security Features
– Extensible Key Management
– Transparent Data Encryption
– SQL Server Audit
 Customer Scenarios and Feedback
– Transparent Data Encryption and Extensible Key Management
– SQL Server Audit
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 4
SQL SERVER 2008 SECURITY
FEATURES
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 5
EXTENSIBLE KEY MANAGEMENT
 Key storage, management
and encryption done by HSM
module
 SQL EKM key is a proxy to
HSM key
 SQL EKM Provider DLL
implements SQLEKM
interface, calls into HSM
module
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 6
SQL EKM Provider DLL
SQL EKM Key
(HSM key proxy)
Data
SQL Server
HSM
DATA ENCRYPTION
 SQL Server 2005
– Built-in encryption functions
– Key management in SQL Server
– Encrypted File System (EFS)
– Bit-Locker
 SQL Server 2008
– Extensible Key Management (EKM)
– Transparent Data Encryption (TDE)
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 7
ADVANTAGES OF USING EKM
 Security
– Data and keys are physically separated (keys are stored in HSM
modules)
– Centralized key management and storage for enterprise
– Additional authentication layer
– Separation of duties between db_owner and data owner
 Performance
– Pluggable hardware encryption boards
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 8
EKM KEY HIERARCHY IN SQL 2008
HSM
Data Data
Native
Symmetric key
TDE DEK key
EKM Symmetric key EKM Asymmetric key
SQL
Server
Symmetric key Asymmetric key
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 9
TRANSPARENT DATA ENCRYPTION
 Encryption/decryption at
database level
 DEK is encrypted with:
– Certificate
– Key residing in a Hardware
Security Module (HSM)
 Certificate required to attach
database files or restore a
backup
SQL Server 2008
DEK
Client Application
Encrypted data page
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 10
SQL Server 2008
Instance Level
Service Master Key
TDE – KEY HIERARCHY
Database Master Key
encrypts Certificate In Master
Database
SQL Server 2008
User Database
Database Encryption Key
DPAPI encrypts
Service Master Key
Service Master Key encrypts
Database Master Key
Password
Operating System Level
Data Protection API (DPAPI)
SQL Server 2008
Master Database
Database Master Key
SQL Server 2008
Master Database
Certificate
Certificate encrypts Database
Encryption Key
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 11
SQL Server 2008
User Database
Database Encryption Key
TDE – KEY HIERARCHY WITH EKM
Asymmetric Key resides on
the EKM device
Asymmetric Key encrypts
Database Encryption Key
Hardware Security Module (HSM)
Asymmetric Key
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 12
REASONS TO USE TDE
 Protects data-at-rest
 Entire database is protected
 Applications do not need to explicitly encrypt/decrypt data!
– No restrictions with indexes or data types (except Filestream)
 Performance cost is small
 Backups are unusable without key
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 13
TDE CONSIDERATIONS
 Compatible with Database Compression
 Not recommended with Backup Compression
 Database Mirroring
– Copy certificate from primary to mirror
 Log files are not retroactively encrypted
– Encryption begins at next VLF boundary
 Tempdb is encrypted when 1 db in instance uses TDE
 Enterprise only
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 14
Enabling TDE
AUDITING DATABASE ACTIVITY
 SQL Server 2005
– SQL Trace
– DDL/DML Triggers
– Third-party tools to read transaction logs
– No management tools support
 SQL Server 2008
– SQL Server Audit
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 16
SQL SERVER AUDIT
 Audit now a 1st Class Server Object
– Native DDL for Audit configuration and management
– Security support
 Create an Audit object to
automatically log actions to:
–File
–Windows Application Log
–Windows Security Log
 Ability to define granular Audit Actions of
Users or Roles on DB objects
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 17
AUDIT SPECIFICATIONS
 Server and database audit specifications for
– Pre-defined action groups
– Individual action filters
 Server action groups
– Server config changes, login/logoff, role membership change, etc.
 Database action groups
– Schema object access, database role membership change,
database object access, database config change
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 18
AUDIT SPECIFICATIONS
19
Audit
Security Event Log
Application Event Log
File
system
0..1
Server audit specification
per Audit object
0..1
DB audit specification
per database
per Audit object
CREATE SERVER AUDIT SPECIFICATION
SvrAC
TO SERVER AUDIT PCI_Audit
ADD (FAILED_LOGIN_GROUP);
CREATE DATABASE AUDIT SPECIFICATION
AuditAC
TO SERVER AUDIT PCI_Audit
ADD (SELECT ON Customers BY
public)
Server Audit
Specification
Server Audit Action
Server Audit Action
Server Audit Action
Server Audit Action
Server Audit Action
Database Audit
ComponentsDatabase Audit
ComponentsDatabase Audit
Components
Database
Audit
Specification
Database Audit Action
Database Audit Action
Database Audit Action
Database Audit Action
Database Audit Action
File
REASONS TO USE SQL AUDIT
 Leverages high performance eventing infrastructure to
generate audits
 Runs within engine rather than as a side/separate app
 Parity with SQL 2005 Audit Generation
 Faster than SQL Trace
 Records changes to Audit configuration
 Configuration and management in SSMS
 (Note: Enterprise Edition only)
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 20
SQL Server Audit
CUSTOMER SCENARIOS
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 22
Business Reasons
 Compliance requirements for PCI, HIPAA, GLBA among many
other acronyms
 Key Management, Encryption, and Auditing are key components to
meeting these compliance requirements
 Refer to Compliance SDK that will be released on sqlcat.com and
Technet this month
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 23
IT Control
SOX
PCI
HIPAA
GLBA
ID Management
Separation of Duties
Encryption
Key Management
Auditing
Control Testing
Policy Management
Transparent Data Encryption
Customer Scenarios
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 24
Transparent Data Encryption
What happens after encryption is enabled
When enabling encryption
 Immediate success provided not blocked by backup
– Can be executed with applications online
 Every page from this point forward is encrypted
 Background task will encrypt existing pages
 TempDB is encrypted with AES 256 (strongest key available)
– This is done independent of algorithm chosen for user database
– If you unencrypt all user database, this does not automatically unencrypt
TempDB
– Consequences for other databases using TempDB intensively
Resources
 Using Transparent Data Encryption with large SAP databases will be
published by Juergen Thomas on sqlcat.com
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 25
Transparent Data Encryption
Operational Impact
 Storage replication at hardware level
– Background task to encrypt all pages
– At HW level, all pages get changed, i.e. all pages need to be replicated
– Need to test if your hardware replication can handle this throughput
 When using Database Mirroring or Log Shipping,
– Ensure that the mirror server has the master key and certificate as well
– Bottleneck isn’t throughput of pages
 Transaction log will have 1 entry for 4 extents (32 pages) noting extents are encrypted
 But, secondary server restore of transaction log uses less threads than principle/primary
servers, i.e. back log in restore activity
– Possible Failover Issues
 Synchronous mirroring backlog may result in not being able to failover since restoring received
transaction log records could take a few hours
 For log shipping restoration of the backups will fall behind, manual failover cannot take place
before restore finally caught up.
– May want to consider disabling HA and perform resynchronization of your HA
configuration
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 26
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security
Transparent Data Encryption
Monitoring Progress of Encryption / Decryption
2727
select DB_NAME(database_id),
case encryption_state
when 1 then 'Unencrypted'
when 2 then 'Encryption in Progress'
when 3 then 'Encrypted'
when 4 then 'DEK change in progress'
when 5 then 'Decryption in progress'
end as encryption_state_desc,
key_algorithm,
key_length,
percent_complete
from sys.dm_database_encryption_keys
Transparent Data Encryption
Customer Scenario
 Observations
– 4 x 2 cores, one LUN for 6 data files on 30 spindles, 10 spindles for log
– Write rate 10-15% higher than read rate
– Writes bundled into 150-180k chunks – less I/O
– Âœ core CPU
 Only one data LUN therefore one background and one coordinating thread
 Recall, CPU is dependent on number of LUNs
– 30MB/s volume for read, encrypt, write for 100GB volume
 1h with AES algorithm
 2.5h with TRIPLE_DES algorithm
 Same for encrypted to decrypted state
 Performance Impact
– Hard to predict 
 “it depends”
– Will impact more write intensive workloads than vs. read-only workloads
– Another customer 2008 (with TDE and PaGE compression) performance on
par with 2005
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 28
Transparent Data Encryption
Quick Guide
When implementing TDE
 Be sure to backup the certificate private key
 Rotate certificates and keys periodically as required by regulations
 Use EKM for stronger key protection and separation of duties
 Monitor key and encryption access
– Policy Based Management
– Auditing (Audit action types: DATABASE_OBJECT_ACCESS_GROUP and
DATABASE_OBJECT_CHANGE_GROUP)
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 29
Possible algorithms include
Extensible Key
Management
Rotation
Key Server
BackupCertificate
Certificate Template
Database
Encryption
Key
Possible algorithms include
AES (128, 192, 256bit) and 3DES
Protects
Auditing
Customer Scenarios
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 30
Auditing
Business Reasons
 Compliance requirements for SOX, PCI, HIPAA, GLBA among
many other acronyms
 Customers like the fact that SQL is attempting to address auditing
issues with this feature
 Additional guidance on how to use it for auditing scenarios can be
found in the Compliance SDK.
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 31
IT Control
SOX
PCI
HIPAA
GLBA
ID Management
Separation of Duties
Encryption
Key Management
Auditing
Control Testing
Policy Management
Auditing
What to audit
 Audit specific users
– Typically want to do sysadmin
– But, many scenarios require auditing of more users because those users
have insert, update access
– Based on your policies
 Audit specific tables
– Audit all tables that can only be modified or deemed as sensitive
 Audit Objects
– Key and encryption access auditing (Audit action types:
DATABASE_OBJECT_ACCESS_GROUP and
DATABASE_OBJECT_CHANGE_GROUP)
 Audit everything approach
– Can grow quite quickly (i.e. lots of data) so may want to limit data
– Or have your audit reporting system filter out data you do not need
PASS Community Summit 2008 <Session ID #> <Session Name> 32
Auditing
Centralizing audit logs and reporting
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 33
Compliance Reports
Process Audit Information
Use SSIS to process SQL2008 audit log data and store in its own SQL database.
File Server SQL 2008
SQL Audit
SSIS
Generate Reports
DB Servers
DB Server
DB Server
DB Server
Transfer Logs
SSRS 2008
Auditing
Centralizing audit logs and reporting
 Centralizing Logs
– Allows you to have one server process all audit logs from your
servers
– Easier manageability
– Set files to 100MB in size (less files, but not too large to process)
– Can also centralize processing
– 
 and centralize reporting
 Compliance SDK contains the full project
– Organized by Server, Database, DDL, and DML actions
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 34
Auditing
Interesting finds from auditing
 Backup a user database:
– Need CREATE permissions on the master database to look at the
backup media
– The CREATE permission is a misnomer since you are not creating
– Nevertheless required to do a backup hence the RESTORE
LABELONLY statements in your audit
 Server Principal Name is the user name
 A lot of VIEW SERVER STATE calls but is part of
important server audit specification (may want to filter this
out)
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 35
Auditing
Caregroup Hospitals Scenario
 Auditing is critical component HIPAA compliance and ensuring patient
privacy
– 1 Billion rows of audit data
– 146 mission critical clinical applications
– Comprehensive audits yield 300-500k transactions/day
– HIPAA requires audit system with 20 years of data
 Auditing Project
– Available to community as part of Compliance SDK
– Collaboration of Caregroup, MCS, SQLCAT
 Quote:
– Creating an enterprise tool for consolidated storage, reporting and alerting of
all application audit data - that's cool!
– John Halamka’s Cool Technology of the Week (Wellsphere Top Health
Blogger, Health Impact Award)
PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 36
Centralized Auditing Reporting in
Action from Caregroup Healthcare
Thank you
for attending this session and the
PASS Community Summit 2008
PASS Community Summit 2008
November 18 – 21, 2008 Seattle WA

Weitere Àhnliche Inhalte

Was ist angesagt?

Security for SharePoint in an Insecure World - SharePoint Connections Amsterd...
Security for SharePoint in an Insecure World - SharePoint Connections Amsterd...Security for SharePoint in an Insecure World - SharePoint Connections Amsterd...
Security for SharePoint in an Insecure World - SharePoint Connections Amsterd...Michael Noel
 
Oracle enterprise manager cloud control 12c
Oracle enterprise manager cloud control 12cOracle enterprise manager cloud control 12c
Oracle enterprise manager cloud control 12csolarisyougood
 
Isaca sql server 2008 r2 security & auditing
Isaca sql server 2008 r2 security & auditingIsaca sql server 2008 r2 security & auditing
Isaca sql server 2008 r2 security & auditingAntonios Chatzipavlis
 
SANKAR_PRASAD_SAHU_SQL_DBA
SANKAR_PRASAD_SAHU_SQL_DBASANKAR_PRASAD_SAHU_SQL_DBA
SANKAR_PRASAD_SAHU_SQL_DBASankar Sahu
 
SQL Server 2012 Security Task
SQL Server 2012 Security TaskSQL Server 2012 Security Task
SQL Server 2012 Security TaskYaakub Idris
 
Protect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemProtect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemSymantec
 
SCOM 2012 service SaaS
SCOM 2012 service SaaSSCOM 2012 service SaaS
SCOM 2012 service SaaSM Senthil Kumar
 
SEASPC 2011 - SharePoint Security in an Insecure World: Understanding the Fiv...
SEASPC 2011 - SharePoint Security in an Insecure World: Understanding the Fiv...SEASPC 2011 - SharePoint Security in an Insecure World: Understanding the Fiv...
SEASPC 2011 - SharePoint Security in an Insecure World: Understanding the Fiv...Michael Noel
 
Windows 7 For Geeks
Windows 7 For GeeksWindows 7 For Geeks
Windows 7 For GeeksAdil Mughal
 
Esm scg configuration_6.0c
Esm scg configuration_6.0cEsm scg configuration_6.0c
Esm scg configuration_6.0cProtect724
 
Discoverer 11.1.1.7 web logic (10.3.6) & ebs r12 12.1.3) implementation guide...
Discoverer 11.1.1.7 web logic (10.3.6) & ebs r12 12.1.3) implementation guide...Discoverer 11.1.1.7 web logic (10.3.6) & ebs r12 12.1.3) implementation guide...
Discoverer 11.1.1.7 web logic (10.3.6) & ebs r12 12.1.3) implementation guide...ginniapps
 
Esm rel notes_6.0c
Esm rel notes_6.0cEsm rel notes_6.0c
Esm rel notes_6.0cProtect724
 
Overview of System Center 2012 R2 Configuration Manager
Overview of System Center 2012 R2 Configuration ManagerOverview of System Center 2012 R2 Configuration Manager
Overview of System Center 2012 R2 Configuration ManagerDigicomp Academy AG
 
38_Spotkanie_PLSSUGweWroclawiu_KilkaSƂów_ApexSQL_FreeTools
38_Spotkanie_PLSSUGweWroclawiu_KilkaSƂów_ApexSQL_FreeTools38_Spotkanie_PLSSUGweWroclawiu_KilkaSƂów_ApexSQL_FreeTools
38_Spotkanie_PLSSUGweWroclawiu_KilkaSƂów_ApexSQL_FreeToolsTobias Koprowski
 
CENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCESCENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCES Array Networks
 
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution BriefDATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief Array Networks
 
SharePoint Security in an Insecure World - AUSPC 2012
SharePoint Security in an Insecure World - AUSPC 2012SharePoint Security in an Insecure World - AUSPC 2012
SharePoint Security in an Insecure World - AUSPC 2012Michael Noel
 
Microsoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanMicrosoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanDavid J Rosenthal
 

Was ist angesagt? (20)

Security for SharePoint in an Insecure World - SharePoint Connections Amsterd...
Security for SharePoint in an Insecure World - SharePoint Connections Amsterd...Security for SharePoint in an Insecure World - SharePoint Connections Amsterd...
Security for SharePoint in an Insecure World - SharePoint Connections Amsterd...
 
Oracle enterprise manager cloud control 12c
Oracle enterprise manager cloud control 12cOracle enterprise manager cloud control 12c
Oracle enterprise manager cloud control 12c
 
Isaca sql server 2008 r2 security & auditing
Isaca sql server 2008 r2 security & auditingIsaca sql server 2008 r2 security & auditing
Isaca sql server 2008 r2 security & auditing
 
SANKAR_PRASAD_SAHU_SQL_DBA
SANKAR_PRASAD_SAHU_SQL_DBASANKAR_PRASAD_SAHU_SQL_DBA
SANKAR_PRASAD_SAHU_SQL_DBA
 
SQL Server 2012 Security Task
SQL Server 2012 Security TaskSQL Server 2012 Security Task
SQL Server 2012 Security Task
 
Protect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemProtect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating System
 
SCOM 2012 service SaaS
SCOM 2012 service SaaSSCOM 2012 service SaaS
SCOM 2012 service SaaS
 
Be2010 ć…šćŠŸèƒœ 20100301
Be2010 ć…šćŠŸèƒœ 20100301Be2010 ć…šćŠŸèƒœ 20100301
Be2010 ć…šćŠŸèƒœ 20100301
 
SEASPC 2011 - SharePoint Security in an Insecure World: Understanding the Fiv...
SEASPC 2011 - SharePoint Security in an Insecure World: Understanding the Fiv...SEASPC 2011 - SharePoint Security in an Insecure World: Understanding the Fiv...
SEASPC 2011 - SharePoint Security in an Insecure World: Understanding the Fiv...
 
Windows 7 For Geeks
Windows 7 For GeeksWindows 7 For Geeks
Windows 7 For Geeks
 
Esm scg configuration_6.0c
Esm scg configuration_6.0cEsm scg configuration_6.0c
Esm scg configuration_6.0c
 
Discoverer 11.1.1.7 web logic (10.3.6) & ebs r12 12.1.3) implementation guide...
Discoverer 11.1.1.7 web logic (10.3.6) & ebs r12 12.1.3) implementation guide...Discoverer 11.1.1.7 web logic (10.3.6) & ebs r12 12.1.3) implementation guide...
Discoverer 11.1.1.7 web logic (10.3.6) & ebs r12 12.1.3) implementation guide...
 
Esm rel notes_6.0c
Esm rel notes_6.0cEsm rel notes_6.0c
Esm rel notes_6.0c
 
Installation
InstallationInstallation
Installation
 
Overview of System Center 2012 R2 Configuration Manager
Overview of System Center 2012 R2 Configuration ManagerOverview of System Center 2012 R2 Configuration Manager
Overview of System Center 2012 R2 Configuration Manager
 
38_Spotkanie_PLSSUGweWroclawiu_KilkaSƂów_ApexSQL_FreeTools
38_Spotkanie_PLSSUGweWroclawiu_KilkaSƂów_ApexSQL_FreeTools38_Spotkanie_PLSSUGweWroclawiu_KilkaSƂów_ApexSQL_FreeTools
38_Spotkanie_PLSSUGweWroclawiu_KilkaSƂów_ApexSQL_FreeTools
 
CENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCESCENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCES
 
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution BriefDATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
 
SharePoint Security in an Insecure World - AUSPC 2012
SharePoint Security in an Insecure World - AUSPC 2012SharePoint Security in an Insecure World - AUSPC 2012
SharePoint Security in an Insecure World - AUSPC 2012
 
Microsoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanMicrosoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by Atidan
 

Andere mochten auch

Designing, Building, and Maintaining Large Cubes using Lessons Learned
Designing, Building, and Maintaining Large Cubes using Lessons LearnedDesigning, Building, and Maintaining Large Cubes using Lessons Learned
Designing, Building, and Maintaining Large Cubes using Lessons LearnedDenny Lee
 
5 Reasons To Ensure HR Application Stability & Security
5 Reasons To Ensure HR Application Stability & Security5 Reasons To Ensure HR Application Stability & Security
5 Reasons To Ensure HR Application Stability & SecurityNGA Human Resources
 
Security strategies
Security strategiesSecurity strategies
Security strategiesYaakub Idris
 
Building and Deploying Large Scale SSRS using Lessons Learned from Customer D...
Building and Deploying Large Scale SSRS using Lessons Learned from Customer D...Building and Deploying Large Scale SSRS using Lessons Learned from Customer D...
Building and Deploying Large Scale SSRS using Lessons Learned from Customer D...Denny Lee
 
SQL Server Reporting Services: IT Best Practices
SQL Server Reporting Services: IT Best PracticesSQL Server Reporting Services: IT Best Practices
SQL Server Reporting Services: IT Best PracticesDenny Lee
 
Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)
Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)
Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)Denny Lee
 
SQL Server Security and Intrusion Prevention
SQL Server Security and Intrusion PreventionSQL Server Security and Intrusion Prevention
SQL Server Security and Intrusion PreventionGabriel Villa
 
SQL Server Integration Services Best Practices
SQL Server Integration Services Best PracticesSQL Server Integration Services Best Practices
SQL Server Integration Services Best PracticesDenny Lee
 
Sql server security in an insecure world
Sql server security in an insecure worldSql server security in an insecure world
Sql server security in an insecure worldGianluca Sartori
 

Andere mochten auch (9)

Designing, Building, and Maintaining Large Cubes using Lessons Learned
Designing, Building, and Maintaining Large Cubes using Lessons LearnedDesigning, Building, and Maintaining Large Cubes using Lessons Learned
Designing, Building, and Maintaining Large Cubes using Lessons Learned
 
5 Reasons To Ensure HR Application Stability & Security
5 Reasons To Ensure HR Application Stability & Security5 Reasons To Ensure HR Application Stability & Security
5 Reasons To Ensure HR Application Stability & Security
 
Security strategies
Security strategiesSecurity strategies
Security strategies
 
Building and Deploying Large Scale SSRS using Lessons Learned from Customer D...
Building and Deploying Large Scale SSRS using Lessons Learned from Customer D...Building and Deploying Large Scale SSRS using Lessons Learned from Customer D...
Building and Deploying Large Scale SSRS using Lessons Learned from Customer D...
 
SQL Server Reporting Services: IT Best Practices
SQL Server Reporting Services: IT Best PracticesSQL Server Reporting Services: IT Best Practices
SQL Server Reporting Services: IT Best Practices
 
Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)
Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)
Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)
 
SQL Server Security and Intrusion Prevention
SQL Server Security and Intrusion PreventionSQL Server Security and Intrusion Prevention
SQL Server Security and Intrusion Prevention
 
SQL Server Integration Services Best Practices
SQL Server Integration Services Best PracticesSQL Server Integration Services Best Practices
SQL Server Integration Services Best Practices
 
Sql server security in an insecure world
Sql server security in an insecure worldSql server security in an insecure world
Sql server security in an insecure world
 

Ähnlich wie SQLCAT - Data and Admin Security

System Center 2012 Virtual Machine Manager
System Center 2012 Virtual Machine ManagerSystem Center 2012 Virtual Machine Manager
System Center 2012 Virtual Machine ManagerNorman Mayes
 
Sql Server 2008 Security Enhanments
Sql Server 2008 Security EnhanmentsSql Server 2008 Security Enhanments
Sql Server 2008 Security EnhanmentsEduardo Castro
 
Under New Management
Under New ManagementUnder New Management
Under New Managementukdpe
 
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...DataStax
 
From Nice to Have to Mission Critical: MySQL Enterprise Edition
From Nice to Have to Mission Critical: MySQL Enterprise EditionFrom Nice to Have to Mission Critical: MySQL Enterprise Edition
From Nice to Have to Mission Critical: MySQL Enterprise Edition郁萍 王
 
Platform Deep Dive
Platform Deep DivePlatform Deep Dive
Platform Deep DiveConrad23
 
DBA Tasks in Oracle Autonomous Database
DBA Tasks in Oracle Autonomous DatabaseDBA Tasks in Oracle Autonomous Database
DBA Tasks in Oracle Autonomous DatabaseSinanPetrusToma
 
Enterprise Cloud Security
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud SecurityMongoDB
 
Sql Server 2008 Product Overview
Sql Server 2008 Product OverviewSql Server 2008 Product Overview
Sql Server 2008 Product OverviewIsmail Muhammad
 
Oracle Solaris 11.1 New Features
Oracle Solaris 11.1 New FeaturesOracle Solaris 11.1 New Features
Oracle Solaris 11.1 New FeaturesOrgad Kimchi
 
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgInformation Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgEric Vanderburg
 
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...Michael Noel
 
Architecture performance and tips and tricks for instantis enterprise track 8...
Architecture performance and tips and tricks for instantis enterprise track 8...Architecture performance and tips and tricks for instantis enterprise track 8...
Architecture performance and tips and tricks for instantis enterprise track 8...p6academy
 
SPS Belgium 2012 - End to End Security for SharePoint Farms - Michael Noel
SPS Belgium 2012 - End to End Security for SharePoint Farms - Michael NoelSPS Belgium 2012 - End to End Security for SharePoint Farms - Michael Noel
SPS Belgium 2012 - End to End Security for SharePoint Farms - Michael NoelMichael Noel
 
Oracle - Enterprise Manager 12c Overview
Oracle - Enterprise Manager 12c OverviewOracle - Enterprise Manager 12c Overview
Oracle - Enterprise Manager 12c OverviewFred Sim
 
Windows Server 2008 (Active Directory Yenilikleri)
Windows Server 2008 (Active Directory Yenilikleri)Windows Server 2008 (Active Directory Yenilikleri)
Windows Server 2008 (Active Directory Yenilikleri)ÇözĂŒmPARK
 
Oracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for ConsolidationOracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for ConsolidationYudi Herdiana
 
Integrigy_Oracle_E-Business_Suite_Security_Risks_Primer_for_Internal_Auditors...
Integrigy_Oracle_E-Business_Suite_Security_Risks_Primer_for_Internal_Auditors...Integrigy_Oracle_E-Business_Suite_Security_Risks_Primer_for_Internal_Auditors...
Integrigy_Oracle_E-Business_Suite_Security_Risks_Primer_for_Internal_Auditors...Minh237839
 

Ähnlich wie SQLCAT - Data and Admin Security (20)

System Center 2012 Virtual Machine Manager
System Center 2012 Virtual Machine ManagerSystem Center 2012 Virtual Machine Manager
System Center 2012 Virtual Machine Manager
 
Sql Server 2008 Security Enhanments
Sql Server 2008 Security EnhanmentsSql Server 2008 Security Enhanments
Sql Server 2008 Security Enhanments
 
Under New Management
Under New ManagementUnder New Management
Under New Management
 
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
 
From Nice to Have to Mission Critical: MySQL Enterprise Edition
From Nice to Have to Mission Critical: MySQL Enterprise EditionFrom Nice to Have to Mission Critical: MySQL Enterprise Edition
From Nice to Have to Mission Critical: MySQL Enterprise Edition
 
Platform Deep Dive
Platform Deep DivePlatform Deep Dive
Platform Deep Dive
 
DBA Tasks in Oracle Autonomous Database
DBA Tasks in Oracle Autonomous DatabaseDBA Tasks in Oracle Autonomous Database
DBA Tasks in Oracle Autonomous Database
 
Enterprise Cloud Security
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud Security
 
Sql Server 2008 Product Overview
Sql Server 2008 Product OverviewSql Server 2008 Product Overview
Sql Server 2008 Product Overview
 
Oracle Solaris 11.1 New Features
Oracle Solaris 11.1 New FeaturesOracle Solaris 11.1 New Features
Oracle Solaris 11.1 New Features
 
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgInformation Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
 
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
 
Architecture performance and tips and tricks for instantis enterprise track 8...
Architecture performance and tips and tricks for instantis enterprise track 8...Architecture performance and tips and tricks for instantis enterprise track 8...
Architecture performance and tips and tricks for instantis enterprise track 8...
 
SPS Belgium 2012 - End to End Security for SharePoint Farms - Michael Noel
SPS Belgium 2012 - End to End Security for SharePoint Farms - Michael NoelSPS Belgium 2012 - End to End Security for SharePoint Farms - Michael Noel
SPS Belgium 2012 - End to End Security for SharePoint Farms - Michael Noel
 
Day2
Day2Day2
Day2
 
Sql 2005 high availability
Sql 2005 high availabilitySql 2005 high availability
Sql 2005 high availability
 
Oracle - Enterprise Manager 12c Overview
Oracle - Enterprise Manager 12c OverviewOracle - Enterprise Manager 12c Overview
Oracle - Enterprise Manager 12c Overview
 
Windows Server 2008 (Active Directory Yenilikleri)
Windows Server 2008 (Active Directory Yenilikleri)Windows Server 2008 (Active Directory Yenilikleri)
Windows Server 2008 (Active Directory Yenilikleri)
 
Oracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for ConsolidationOracle Database 12c Multitenant for Consolidation
Oracle Database 12c Multitenant for Consolidation
 
Integrigy_Oracle_E-Business_Suite_Security_Risks_Primer_for_Internal_Auditors...
Integrigy_Oracle_E-Business_Suite_Security_Risks_Primer_for_Internal_Auditors...Integrigy_Oracle_E-Business_Suite_Security_Risks_Primer_for_Internal_Auditors...
Integrigy_Oracle_E-Business_Suite_Security_Risks_Primer_for_Internal_Auditors...
 

Mehr von Denny Lee

Azure Cosmos DB: Globally Distributed Multi-Model Database Service
Azure Cosmos DB: Globally Distributed Multi-Model Database ServiceAzure Cosmos DB: Globally Distributed Multi-Model Database Service
Azure Cosmos DB: Globally Distributed Multi-Model Database ServiceDenny Lee
 
Spark to DocumentDB connector
Spark to DocumentDB connectorSpark to DocumentDB connector
Spark to DocumentDB connectorDenny Lee
 
Introduction to Azure DocumentDB
Introduction to Azure DocumentDBIntroduction to Azure DocumentDB
Introduction to Azure DocumentDBDenny Lee
 
Introduction to Microsoft's Big Data Platform and Hadoop Primer
Introduction to Microsoft's Big Data Platform and Hadoop PrimerIntroduction to Microsoft's Big Data Platform and Hadoop Primer
Introduction to Microsoft's Big Data Platform and Hadoop PrimerDenny Lee
 
Yahoo!, Big Data, and Microsoft BI: Bigger and Better Together
Yahoo!, Big Data, and Microsoft BI: Bigger and Better TogetherYahoo!, Big Data, and Microsoft BI: Bigger and Better Together
Yahoo!, Big Data, and Microsoft BI: Bigger and Better TogetherDenny Lee
 
SQL Server Reporting Services Disaster Recovery webinar
SQL Server Reporting Services Disaster Recovery webinarSQL Server Reporting Services Disaster Recovery webinar
SQL Server Reporting Services Disaster Recovery webinarDenny Lee
 
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008Denny Lee
 
SQLCAT: A Preview to PowerPivot Server Best Practices
SQLCAT: A Preview to PowerPivot Server Best PracticesSQLCAT: A Preview to PowerPivot Server Best Practices
SQLCAT: A Preview to PowerPivot Server Best PracticesDenny Lee
 
Deploying and Managing PowerPivot for SharePoint
Deploying and Managing PowerPivot for SharePointDeploying and Managing PowerPivot for SharePoint
Deploying and Managing PowerPivot for SharePointDenny Lee
 
SQLCAT: Tier-1 BI in the World of Big Data
SQLCAT: Tier-1 BI in the World of Big DataSQLCAT: Tier-1 BI in the World of Big Data
SQLCAT: Tier-1 BI in the World of Big DataDenny Lee
 
Big Data, Bigger Brains
Big Data, Bigger BrainsBig Data, Bigger Brains
Big Data, Bigger BrainsDenny Lee
 
Jump Start into Apache Spark (Seattle Spark Meetup)
Jump Start into Apache Spark (Seattle Spark Meetup)Jump Start into Apache Spark (Seattle Spark Meetup)
Jump Start into Apache Spark (Seattle Spark Meetup)Denny Lee
 
How Concur uses Big Data to get you to Tableau Conference On Time
How Concur uses Big Data to get you to Tableau Conference On TimeHow Concur uses Big Data to get you to Tableau Conference On Time
How Concur uses Big Data to get you to Tableau Conference On TimeDenny Lee
 
SQL Server Reporting Services Disaster Recovery Webinar
SQL Server Reporting Services Disaster Recovery WebinarSQL Server Reporting Services Disaster Recovery Webinar
SQL Server Reporting Services Disaster Recovery WebinarDenny Lee
 
Ensuring compliance of patient data with big data and bi [bdii 301-m] - (4078)
Ensuring compliance of patient data with big data and bi [bdii 301-m] - (4078)Ensuring compliance of patient data with big data and bi [bdii 301-m] - (4078)
Ensuring compliance of patient data with big data and bi [bdii 301-m] - (4078)Denny Lee
 
Yahoo! TAO Case Study Excerpt
Yahoo! TAO Case Study ExcerptYahoo! TAO Case Study Excerpt
Yahoo! TAO Case Study ExcerptDenny Lee
 
SQL Server Reporting Services: IT Best Practices
SQL Server Reporting Services: IT Best PracticesSQL Server Reporting Services: IT Best Practices
SQL Server Reporting Services: IT Best PracticesDenny Lee
 
Building SSRS 2008 large scale solutions
Building SSRS 2008 large scale solutionsBuilding SSRS 2008 large scale solutions
Building SSRS 2008 large scale solutionsDenny Lee
 
How Klout is changing the landscape of social media with Hadoop and BI
How Klout is changing the landscape of social media with Hadoop and BIHow Klout is changing the landscape of social media with Hadoop and BI
How Klout is changing the landscape of social media with Hadoop and BIDenny Lee
 
A primer on power pivot topology and configurations
A primer on power pivot topology and configurationsA primer on power pivot topology and configurations
A primer on power pivot topology and configurationsDenny Lee
 

Mehr von Denny Lee (20)

Azure Cosmos DB: Globally Distributed Multi-Model Database Service
Azure Cosmos DB: Globally Distributed Multi-Model Database ServiceAzure Cosmos DB: Globally Distributed Multi-Model Database Service
Azure Cosmos DB: Globally Distributed Multi-Model Database Service
 
Spark to DocumentDB connector
Spark to DocumentDB connectorSpark to DocumentDB connector
Spark to DocumentDB connector
 
Introduction to Azure DocumentDB
Introduction to Azure DocumentDBIntroduction to Azure DocumentDB
Introduction to Azure DocumentDB
 
Introduction to Microsoft's Big Data Platform and Hadoop Primer
Introduction to Microsoft's Big Data Platform and Hadoop PrimerIntroduction to Microsoft's Big Data Platform and Hadoop Primer
Introduction to Microsoft's Big Data Platform and Hadoop Primer
 
Yahoo!, Big Data, and Microsoft BI: Bigger and Better Together
Yahoo!, Big Data, and Microsoft BI: Bigger and Better TogetherYahoo!, Big Data, and Microsoft BI: Bigger and Better Together
Yahoo!, Big Data, and Microsoft BI: Bigger and Better Together
 
SQL Server Reporting Services Disaster Recovery webinar
SQL Server Reporting Services Disaster Recovery webinarSQL Server Reporting Services Disaster Recovery webinar
SQL Server Reporting Services Disaster Recovery webinar
 
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
 
SQLCAT: A Preview to PowerPivot Server Best Practices
SQLCAT: A Preview to PowerPivot Server Best PracticesSQLCAT: A Preview to PowerPivot Server Best Practices
SQLCAT: A Preview to PowerPivot Server Best Practices
 
Deploying and Managing PowerPivot for SharePoint
Deploying and Managing PowerPivot for SharePointDeploying and Managing PowerPivot for SharePoint
Deploying and Managing PowerPivot for SharePoint
 
SQLCAT: Tier-1 BI in the World of Big Data
SQLCAT: Tier-1 BI in the World of Big DataSQLCAT: Tier-1 BI in the World of Big Data
SQLCAT: Tier-1 BI in the World of Big Data
 
Big Data, Bigger Brains
Big Data, Bigger BrainsBig Data, Bigger Brains
Big Data, Bigger Brains
 
Jump Start into Apache Spark (Seattle Spark Meetup)
Jump Start into Apache Spark (Seattle Spark Meetup)Jump Start into Apache Spark (Seattle Spark Meetup)
Jump Start into Apache Spark (Seattle Spark Meetup)
 
How Concur uses Big Data to get you to Tableau Conference On Time
How Concur uses Big Data to get you to Tableau Conference On TimeHow Concur uses Big Data to get you to Tableau Conference On Time
How Concur uses Big Data to get you to Tableau Conference On Time
 
SQL Server Reporting Services Disaster Recovery Webinar
SQL Server Reporting Services Disaster Recovery WebinarSQL Server Reporting Services Disaster Recovery Webinar
SQL Server Reporting Services Disaster Recovery Webinar
 
Ensuring compliance of patient data with big data and bi [bdii 301-m] - (4078)
Ensuring compliance of patient data with big data and bi [bdii 301-m] - (4078)Ensuring compliance of patient data with big data and bi [bdii 301-m] - (4078)
Ensuring compliance of patient data with big data and bi [bdii 301-m] - (4078)
 
Yahoo! TAO Case Study Excerpt
Yahoo! TAO Case Study ExcerptYahoo! TAO Case Study Excerpt
Yahoo! TAO Case Study Excerpt
 
SQL Server Reporting Services: IT Best Practices
SQL Server Reporting Services: IT Best PracticesSQL Server Reporting Services: IT Best Practices
SQL Server Reporting Services: IT Best Practices
 
Building SSRS 2008 large scale solutions
Building SSRS 2008 large scale solutionsBuilding SSRS 2008 large scale solutions
Building SSRS 2008 large scale solutions
 
How Klout is changing the landscape of social media with Hadoop and BI
How Klout is changing the landscape of social media with Hadoop and BIHow Klout is changing the landscape of social media with Hadoop and BI
How Klout is changing the landscape of social media with Hadoop and BI
 
A primer on power pivot topology and configurations
A primer on power pivot topology and configurationsA primer on power pivot topology and configurations
A primer on power pivot topology and configurations
 

KĂŒrzlich hochgeladen

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

KĂŒrzlich hochgeladen (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

SQLCAT - Data and Admin Security

  • 1. SQLCAT ‐ Data and Admin Security Il-Sung Lee, Senior Program Manager Denny Lee, Senior Program Manager Ayad Shammout, Caregroup Healthcare PASS Community Summit 2008 November 18 – 21, 2008 Seattle WA
  • 2. SQL Server Customer Advisory Team (SQLCAT)  Works on the largest, most complex SQL Server projects worldwide – US: NASDAQ, Progressive, Premier Bankcard, Hilton Hotels – Europe: Barclays Capital, Danske Bank, McLaren, Bwin – Asia/Pacific: Korea Telecom, GMarket, Japan Railways East, China Mobile – LATAM: Banco Itau, Oi – Strategic ISVs: SAP, Siebel, JDE, PeopleSoft, GE Healthcare, SunGard, Siemens, Dynamics and more  Drives product requirements back into SQL Server from our customers and ISVs  Shares deep technical content with SQL Server community – SQLCAT.com – http://blogs.msdn.com/sqlcat – http://blogs.msdn.com/mssqlisv – http://technet.microsoft.com/en-us/sqlserver/bb331794.aspx 2PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security
  • 3. SQL Server Design Win Program  Target the Most Challenging and Innovative Applications on SQL Server  Investing in Large Scale, Referenceable SQL Server Projects Across the World – Provide SQLCAT technical & project experience – Conduct architecture and design reviews covering performance, operation, scalability and availability aspects – Offer use of HW lab in Redmond with direct access to SQL Server development team  Work with Marketing Team Developing Case Studies PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 3
  • 4. AGENDA  SQL Server 2008 Security Features – Extensible Key Management – Transparent Data Encryption – SQL Server Audit  Customer Scenarios and Feedback – Transparent Data Encryption and Extensible Key Management – SQL Server Audit PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 4
  • 5. SQL SERVER 2008 SECURITY FEATURES PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 5
  • 6. EXTENSIBLE KEY MANAGEMENT  Key storage, management and encryption done by HSM module  SQL EKM key is a proxy to HSM key  SQL EKM Provider DLL implements SQLEKM interface, calls into HSM module PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 6 SQL EKM Provider DLL SQL EKM Key (HSM key proxy) Data SQL Server HSM
  • 7. DATA ENCRYPTION  SQL Server 2005 – Built-in encryption functions – Key management in SQL Server – Encrypted File System (EFS) – Bit-Locker  SQL Server 2008 – Extensible Key Management (EKM) – Transparent Data Encryption (TDE) PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 7
  • 8. ADVANTAGES OF USING EKM  Security – Data and keys are physically separated (keys are stored in HSM modules) – Centralized key management and storage for enterprise – Additional authentication layer – Separation of duties between db_owner and data owner  Performance – Pluggable hardware encryption boards PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 8
  • 9. EKM KEY HIERARCHY IN SQL 2008 HSM Data Data Native Symmetric key TDE DEK key EKM Symmetric key EKM Asymmetric key SQL Server Symmetric key Asymmetric key PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 9
  • 10. TRANSPARENT DATA ENCRYPTION  Encryption/decryption at database level  DEK is encrypted with: – Certificate – Key residing in a Hardware Security Module (HSM)  Certificate required to attach database files or restore a backup SQL Server 2008 DEK Client Application Encrypted data page PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 10
  • 11. SQL Server 2008 Instance Level Service Master Key TDE – KEY HIERARCHY Database Master Key encrypts Certificate In Master Database SQL Server 2008 User Database Database Encryption Key DPAPI encrypts Service Master Key Service Master Key encrypts Database Master Key Password Operating System Level Data Protection API (DPAPI) SQL Server 2008 Master Database Database Master Key SQL Server 2008 Master Database Certificate Certificate encrypts Database Encryption Key PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 11
  • 12. SQL Server 2008 User Database Database Encryption Key TDE – KEY HIERARCHY WITH EKM Asymmetric Key resides on the EKM device Asymmetric Key encrypts Database Encryption Key Hardware Security Module (HSM) Asymmetric Key PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 12
  • 13. REASONS TO USE TDE  Protects data-at-rest  Entire database is protected  Applications do not need to explicitly encrypt/decrypt data! – No restrictions with indexes or data types (except Filestream)  Performance cost is small  Backups are unusable without key PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 13
  • 14. TDE CONSIDERATIONS  Compatible with Database Compression  Not recommended with Backup Compression  Database Mirroring – Copy certificate from primary to mirror  Log files are not retroactively encrypted – Encryption begins at next VLF boundary  Tempdb is encrypted when 1 db in instance uses TDE  Enterprise only PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 14
  • 16. AUDITING DATABASE ACTIVITY  SQL Server 2005 – SQL Trace – DDL/DML Triggers – Third-party tools to read transaction logs – No management tools support  SQL Server 2008 – SQL Server Audit PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 16
  • 17. SQL SERVER AUDIT  Audit now a 1st Class Server Object – Native DDL for Audit configuration and management – Security support  Create an Audit object to automatically log actions to: –File –Windows Application Log –Windows Security Log  Ability to define granular Audit Actions of Users or Roles on DB objects PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 17
  • 18. AUDIT SPECIFICATIONS  Server and database audit specifications for – Pre-defined action groups – Individual action filters  Server action groups – Server config changes, login/logoff, role membership change, etc.  Database action groups – Schema object access, database role membership change, database object access, database config change PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 18
  • 19. AUDIT SPECIFICATIONS 19 Audit Security Event Log Application Event Log File system 0..1 Server audit specification per Audit object 0..1 DB audit specification per database per Audit object CREATE SERVER AUDIT SPECIFICATION SvrAC TO SERVER AUDIT PCI_Audit ADD (FAILED_LOGIN_GROUP); CREATE DATABASE AUDIT SPECIFICATION AuditAC TO SERVER AUDIT PCI_Audit ADD (SELECT ON Customers BY public) Server Audit Specification Server Audit Action Server Audit Action Server Audit Action Server Audit Action Server Audit Action Database Audit ComponentsDatabase Audit ComponentsDatabase Audit Components Database Audit Specification Database Audit Action Database Audit Action Database Audit Action Database Audit Action Database Audit Action File
  • 20. REASONS TO USE SQL AUDIT  Leverages high performance eventing infrastructure to generate audits  Runs within engine rather than as a side/separate app  Parity with SQL 2005 Audit Generation  Faster than SQL Trace  Records changes to Audit configuration  Configuration and management in SSMS  (Note: Enterprise Edition only) PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 20
  • 22. CUSTOMER SCENARIOS PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 22
  • 23. Business Reasons  Compliance requirements for PCI, HIPAA, GLBA among many other acronyms  Key Management, Encryption, and Auditing are key components to meeting these compliance requirements  Refer to Compliance SDK that will be released on sqlcat.com and Technet this month PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 23 IT Control SOX PCI HIPAA GLBA ID Management Separation of Duties Encryption Key Management Auditing Control Testing Policy Management
  • 24. Transparent Data Encryption Customer Scenarios PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 24
  • 25. Transparent Data Encryption What happens after encryption is enabled When enabling encryption  Immediate success provided not blocked by backup – Can be executed with applications online  Every page from this point forward is encrypted  Background task will encrypt existing pages  TempDB is encrypted with AES 256 (strongest key available) – This is done independent of algorithm chosen for user database – If you unencrypt all user database, this does not automatically unencrypt TempDB – Consequences for other databases using TempDB intensively Resources  Using Transparent Data Encryption with large SAP databases will be published by Juergen Thomas on sqlcat.com PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 25
  • 26. Transparent Data Encryption Operational Impact  Storage replication at hardware level – Background task to encrypt all pages – At HW level, all pages get changed, i.e. all pages need to be replicated – Need to test if your hardware replication can handle this throughput  When using Database Mirroring or Log Shipping, – Ensure that the mirror server has the master key and certificate as well – Bottleneck isn’t throughput of pages  Transaction log will have 1 entry for 4 extents (32 pages) noting extents are encrypted  But, secondary server restore of transaction log uses less threads than principle/primary servers, i.e. back log in restore activity – Possible Failover Issues  Synchronous mirroring backlog may result in not being able to failover since restoring received transaction log records could take a few hours  For log shipping restoration of the backups will fall behind, manual failover cannot take place before restore finally caught up. – May want to consider disabling HA and perform resynchronization of your HA configuration PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 26
  • 27. PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security Transparent Data Encryption Monitoring Progress of Encryption / Decryption 2727 select DB_NAME(database_id), case encryption_state when 1 then 'Unencrypted' when 2 then 'Encryption in Progress' when 3 then 'Encrypted' when 4 then 'DEK change in progress' when 5 then 'Decryption in progress' end as encryption_state_desc, key_algorithm, key_length, percent_complete from sys.dm_database_encryption_keys
  • 28. Transparent Data Encryption Customer Scenario  Observations – 4 x 2 cores, one LUN for 6 data files on 30 spindles, 10 spindles for log – Write rate 10-15% higher than read rate – Writes bundled into 150-180k chunks – less I/O – Âœ core CPU  Only one data LUN therefore one background and one coordinating thread  Recall, CPU is dependent on number of LUNs – 30MB/s volume for read, encrypt, write for 100GB volume  1h with AES algorithm  2.5h with TRIPLE_DES algorithm  Same for encrypted to decrypted state  Performance Impact – Hard to predict 
 “it depends” – Will impact more write intensive workloads than vs. read-only workloads – Another customer 2008 (with TDE and PaGE compression) performance on par with 2005 PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 28
  • 29. Transparent Data Encryption Quick Guide When implementing TDE  Be sure to backup the certificate private key  Rotate certificates and keys periodically as required by regulations  Use EKM for stronger key protection and separation of duties  Monitor key and encryption access – Policy Based Management – Auditing (Audit action types: DATABASE_OBJECT_ACCESS_GROUP and DATABASE_OBJECT_CHANGE_GROUP) PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 29 Possible algorithms include Extensible Key Management Rotation Key Server BackupCertificate Certificate Template Database Encryption Key Possible algorithms include AES (128, 192, 256bit) and 3DES Protects
  • 30. Auditing Customer Scenarios PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 30
  • 31. Auditing Business Reasons  Compliance requirements for SOX, PCI, HIPAA, GLBA among many other acronyms  Customers like the fact that SQL is attempting to address auditing issues with this feature  Additional guidance on how to use it for auditing scenarios can be found in the Compliance SDK. PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 31 IT Control SOX PCI HIPAA GLBA ID Management Separation of Duties Encryption Key Management Auditing Control Testing Policy Management
  • 32. Auditing What to audit  Audit specific users – Typically want to do sysadmin – But, many scenarios require auditing of more users because those users have insert, update access – Based on your policies  Audit specific tables – Audit all tables that can only be modified or deemed as sensitive  Audit Objects – Key and encryption access auditing (Audit action types: DATABASE_OBJECT_ACCESS_GROUP and DATABASE_OBJECT_CHANGE_GROUP)  Audit everything approach – Can grow quite quickly (i.e. lots of data) so may want to limit data – Or have your audit reporting system filter out data you do not need PASS Community Summit 2008 <Session ID #> <Session Name> 32
  • 33. Auditing Centralizing audit logs and reporting PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 33 Compliance Reports Process Audit Information Use SSIS to process SQL2008 audit log data and store in its own SQL database. File Server SQL 2008 SQL Audit SSIS Generate Reports DB Servers DB Server DB Server DB Server Transfer Logs SSRS 2008
  • 34. Auditing Centralizing audit logs and reporting  Centralizing Logs – Allows you to have one server process all audit logs from your servers – Easier manageability – Set files to 100MB in size (less files, but not too large to process) – Can also centralize processing – 
 and centralize reporting  Compliance SDK contains the full project – Organized by Server, Database, DDL, and DML actions PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 34
  • 35. Auditing Interesting finds from auditing  Backup a user database: – Need CREATE permissions on the master database to look at the backup media – The CREATE permission is a misnomer since you are not creating – Nevertheless required to do a backup hence the RESTORE LABELONLY statements in your audit  Server Principal Name is the user name  A lot of VIEW SERVER STATE calls but is part of important server audit specification (may want to filter this out) PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 35
  • 36. Auditing Caregroup Hospitals Scenario  Auditing is critical component HIPAA compliance and ensuring patient privacy – 1 Billion rows of audit data – 146 mission critical clinical applications – Comprehensive audits yield 300-500k transactions/day – HIPAA requires audit system with 20 years of data  Auditing Project – Available to community as part of Compliance SDK – Collaboration of Caregroup, MCS, SQLCAT  Quote: – Creating an enterprise tool for consolidated storage, reporting and alerting of all application audit data - that's cool! – John Halamka’s Cool Technology of the Week (Wellsphere Top Health Blogger, Health Impact Award) PASS Community Summit 2008 DBA-402-A SQLCAT - Security -- Data Security, Admin Security 36
  • 37. Centralized Auditing Reporting in Action from Caregroup Healthcare
  • 38. Thank you for attending this session and the PASS Community Summit 2008 PASS Community Summit 2008 November 18 – 21, 2008 Seattle WA

Hinweis der Redaktion

  1. 1
  2. Why consider encryption? Additional layer of security Required by some regulatory compliance laws Database security is a growing concern for many enterprises Recent regulations have mandated strict requirements for data security, data privacy and data integrity 2005 Cons Built-in encryption functions require application change EFS has performance issues with SQL Bit-Locker – encryption doesn’t stick to data and only available on Vista/Windows Server 2008
  3. Consolidation across enterprise Simplify key management and storage Includes, key generation, retrieval, aging, etc. Offer functionality not available in SQL Server
  4. In SQL Server 2005, you can encrypt data in the database by writing custom Transact-SQL that uses the cryptographic capabilities of the database engine. SQL Server 2008 improves upon this situation by introducing transparent data encryption. Transparent data encryption performs all cryptographic operations at the database level removing any need for application developers to create custom code to encrypt and decrypt data/logs. Data is encrypted as it is written to disk, and decrypted as it is read from disk. By using SQL Server to manage encryption and decryption transparently, you can secure business data in the database without requiring any changes to existing applications
  5. 27
  6. 38