Securing Your Sensitive Data with EKM & TDE. on SQL Server 2008/2012



Similar documents
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT

Encryption Key Management for Microsoft SQL Server 2008/2014

Alliance Key Manager Cloud HSM Frequently Asked Questions

Microsoft SQL Server Integration Guide

PrivateServer HSM EKM Provider for Microsoft SQL Server

Securing Data on Microsoft SQL Server 2012

Key Management in the Multi-Platform Environment

MS-55096: Securing Data on Microsoft SQL Server 2012

Critical Steps to Encryption & Key Management in the Microsoft Azure Cloud

Thales Database Security Option Pack. for Microsoft SQL Server Integration Guide.

Alliance Key Manager Solution Brief

Alliance AES Key Management

Automatic Encryption With V7R1 Townsend Security

MySQL Security: Best Practices

BMC s Security Strategy for ITSM in the SaaS Environment

Transparent Data Encryption: New Technologies and Best Practices for Database Encryption

Deploying PGP Encryption and Compression for z/os Batch Data Protection to (FIPS-140) Compliance

SQL Server Encryption Overview. September 2, 2015

Preface. Microsoft Office Sharepoint Server 2007 Integration Guide SafeNet, Inc. All rights reserved. Part Number: (Rev A, 06/2009)

SafeNet MSSQL EKM Provider User Guide

Key Management Best Practices

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Vormetric Data Security Platform Data Sheet

SafeNet DataSecure vs. Native Oracle Encryption

Cloud Security and Managing Use Risks

Alliance AES Encryption for IBM i Solution Brief

Microsoft Dynamics CRM 2011 Installation and Deployment

Using BroadSAFE TM Technology 07/18/05

IT Forum UW-Madison Records Management Program. UW Archives and Records Management

PRIME IDENTITY MANAGEMENT CORE

Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective

REQUEST FOR QUOTATION (RFQ) Encryption Key Management Solution. Date Posted: May 27, Solicitation Number RFQ

Database Security SQL Server 2012

IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse.

Healthcare Compliance Solutions

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Auditing Data Access Without Bringing Your Database To Its Knees

05.0 Application Development

Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager

Upgrading Your SQL Server 2000 Database Administration (DBA) Skills to SQL Server 2008 DBA Skills Course 6317A: Three days; Instructor-Led

Oracle Database 11g: Security. What you will learn:

Course Outline: Course 6317: Upgrading Your SQL Server 2000 Database Administration (DBA) Skills to SQL Server 2008 DBA Skills

Healthcare Compliance Solutions

Altius IT Policy Collection Compliance and Standards Matrix

SecureD Technical Overview

White Paper How Noah Mobile uses Microsoft Azure Core Services

How To Improve Your Business

PCI Data Security. Meeting the Challenges of PCI DSS Payment Card Security

Townsend Security Addendum to VMware Product Applicability Guide for Payment Card Industry Data Security Standard (PCI DSS) version 3.

DRAFT Standard Statement Encryption

Oracle 1Z0-528 Exam Questions & Answers

Managed Encryption Service

Compliance and Industry Regulations

Guide to Data Field Encryption

All Things Oracle Database Encryption

SQL Server for Database Administrators Course Syllabus

Updating Your Microsoft SQL Server 2005 Skills to SQL Server 2008

Cloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015

MySQL Strategy. Morten Andersen, MySQL Enterprise Sales. Copyright 2014 Oracle and/or its affiliates. All rights reserved.

Course: 10174B: Configuring and Administering Microsoft SharePoint 2010

Administering Microsoft SQL Server Databases

Designing Database Solutions for Microsoft SQL Server 2012

Oracle Database 11g: Security

Alliance Key Manager A Solution Brief for Technical Implementers

ADMINISTERING MICROSOFT SQL SERVER DATABASES

Microsoft Dynamics 2011: MS Installation and Deployment

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

The Education Fellowship Finance Centralisation IT Security Strategy

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

CipherShare Features and Benefits

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

Practical Storage Security With Key Management. Russ Fellows, Evaluator Group

With Eversync s cloud data tiering, the customer can tier data protection as follows:

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

Achieving Security through Compliance

SECURELINK.COM COMPLIANCE AND INDUSTRY REGULATIONS

Microsoft SQL Database Administrator Certification

I N F O R M A T I O N S E C U R I T Y

Administering Microsoft SQL Server Databases

Administering Microsoft SQL Server Databases

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

California Department of Technology, Office of Technology Services MICROSOFT SQL SERVER GUIDELINE

Intelligent Vendor Risk Management

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

DELL POWERVAULT LIBRARY-MANAGED ENCRYPTION FOR TAPE. By Libby McTeer

SafeNet Securing Microsoft Solutions

Frequently Asked Questions: EMC Isilon Data at Rest Encryption Solution

Privacy and Encryption in egovernment. Dewey Landrum Technical Architect CSO SLED West Sector CISSP August 11, 2008

McAfee Firewall Enterprise 8.2.1

risk advisory TAX Finance & Accounting Dave Elliott, CIPP/G/C, CISSP, CISA Chip Zodrow Paul Rozek, CGEIT

Complying with PCI Data Security

Security Trends and Client Approaches

MOC 20467B: Designing Business Intelligence Solutions with Microsoft SQL Server 2012

Microsoft SharePoint 2010 Overview

Transcription:

Securing Your Sensitive Data with EKM & TDE on SQL Server 2008/2012

About The Speaker Founder & CEO of Townsend Security Leading data security expert 30 years IT industry experience

Introduction Organizations of all sizes are under multiple compliance regulations Encryption is perceived to be the hardest part of compliance Key management is perceived to be the hardest part of encryption

Session Roadmap Compliance and Standards Key Management Critical for Compliance Microsoft EKM Architecture EKM Supported Platforms Transparent Data Encryption Cell Level Encryption

Session Roadmap (cont.) Performance Considerations Should I upgrade? The Business Case Migrating to EKM with Key Management How about SharePoint and Dynamics Encryption?

PCI DSS Credit Card Payments HIPAA / HITECH Act Medical GLBA / FFIEC Banking and Finance State Privacy (proposed Federal)

Compliance and Standards (Cont.) FISMA Federal Govt. FERPA Educational Institutions Federal Trade Commission Consumer Fraud

Where Do Regulations Come From? National Institute of Standards and Technology (NIST) International Standards Organization ISO American National Standards Institute ANSI IEEE 1619.3 Key Management for Storage

What are the Standards and Certifications? AES encryption standard is from NIST AES Validation Cryptographic module certification for key management is from NIST FIPS 140-2 RSA and ECC cryptographic module certification is from NIST RSA and ECC validation FIPS 140-2 certification

Key Management: Critical for Compliance Dual Control & Separation of Duties why do they matter? Not new concepts, very common in financial operations

Dual Control Two or more people authenticate to perform ONE operation Example: Two signatures required on checks Key Management: Two or more people must authenticate

Separation of Duties Different people perform different operations Example: Different person prints the checks than signs them Key Management: Different people manage encryption keys than manage databases Locally stored keys result in audit failures

SQL Server EKM Capabilities Extensible Key Management starting with SQL Server 2008 Transparent Data Encryption (TDE) Cell Level Encryption HSM hosted keys Symmetric and Asymmetric Encryption

EKM Supported Platforms SQL Server 2008 Enterprise Edition or higher SQL Server 2008 R2 Enterprise Edition or higher SQL Server 2012 Enterprise Edition or higher SQL Server Developer and Evaluation Editions

Non EKM Platforms EKM not supported on: SQL Server 2000 SQL Server 2005 SQL Server 2008/2012 Express Edition SQL Server 2008/2012 Standard Edition SQL Server 2008/2012 Web Edition

SQL Server EKM Architecture SQL Server with EKM support EKM Provider software (vendor provided) Key manager HSM

Transparent Data Encryption (TDE) Entire table space is encrypted Temporary space and logs are encrypted Symmetric key is protected by Asymmetric key on key manager Encryption key protected by the HSM

Transparent Data Encryption (TDE) Symmetric key is unlocked during SQL Server start SQL Server performs all encryption tasks (not an HSM task)

EKM TDE with HSM example create cryptographic provider KeyConnection from file = 'C:\Program Files\Townsend Security\Key Connection for SQL Server\bin\EkmProvider.dll';

EKM TDE with HSM example use master; create asymmetric key rsa_key from provider KeyConnection with provider_key_name = 'RSA- KEY', creation_disposition = open_existing;

EKM TDE with HSM example use mydatabase; create database encryption key with algorithm = AES_256 encryption by server asymmetric key rsa_key;

EKM TDE with HSM example alter database mydatabase set encryption on;

Migrating EKM TDE encryption to an HSM strategy Without a key server HSM, SQL Server data encryption key is protected by key encryption key stored on the server Migrating to HSM protection is easy just two or three commands

Cell Level Encryption Only selected cells (columns) are encrypted Requires changes to SQL statements EKM Provider called for each encryption request Symmetric keys are retrieved from key manager HSM as needed EKM Provider performs encryption tasks

EKM Cell Level HSM example create cryptographic provider KeyConnection from file = 'C:\Program Files\Townsend Security\Key Connection for SQL Server\bin\EkmProvider.dll';

EKM Cell Level HSM example select provider_id from sys.dm_cryptographic_provider_properties where friendly_name = 'Key Connection for SQL Server';

EKM Cell Level HSM example select * from sys.dm_cryptographic_provider_keys(provider_id);

EKM with HSM example create symmetric key my_key from provider KeyConnection with provider_key_name = 'KEY01-128', creation_disposition = open_existing;

EKM with HSM example select encryptbykey(key_guid('my_key'), 'Hello World'); select decryptbykey(some_column) from some_table; insert into my_table values (encryptbykey(key_guid('my_key'), 'Hello World', 1, 'Townsend Security'));

Performance considerations TDE works best on small and mid-sized databases TDE imposes about 1.5% to 2% performance impact Backups may take longer with TDE due to low compression

Performance considerations Cell Level Encryption is best for large databases EKM Provider can help with Cell Level encryption performance

Upgrade for EKM? The Business Case Cost/Benefit analysis is important in upgrade scenarios Most companies view encryption as risk mitigation ROI is not appropriate TDE is low impact from a maintenance point of view

SharePoint Encryption? SharePoint 2010 supports SQL Server TDE

Dynamics CRM Encryption? Microsoft Dynamics CRM applications with SQL Server TDE

Dynamics CRM Encryption What Microsoft says about Dynamics CRM 4.0 with TDE encryption: For business scenarios that require a level of protection for the entire database at rest, consider enabling TDE, which test results confirm will have a minimal effect on the performance of existing applications.

Thank You Conclusion