Protecting Your Data With Encryption



Similar documents
SQL Server Encryption Overview. September 2, 2015

HOW ENCRYPTION WORKS. Introduction to BackupEDGE Data Encryption. Technology Overview. Strong Encryption BackupEDGE

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Alliance Key Manager Solution Brief

Microsoft SQL Server Integration Guide

FileCloud Security FAQ

Privacy and Encryption in egovernment. Dewey Landrum Technical Architect CSO SLED West Sector CISSP August 11, 2008

MySQL Security: Best Practices

Alliance Key Manager Cloud HSM Frequently Asked Questions

What s New in MySQL 5.7 Security Georgi Joro Kodinov Team Lead MySQL Server General Team

Security Considerations for DirectAccess Deployments. Whitepaper

Transparent Data Encryption: New Technologies and Best Practices for Database Encryption

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Encryption Key Management for Microsoft SQL Server 2008/2014

SafeNet MSSQL EKM Provider User Guide

Proto Balance SSL TLS Off-Loading, Load Balancing. User Manual - SSL.

Zmanda Cloud Backup Frequently Asked Questions

Database Security SQL Server 2012

All Things Oracle Database Encryption

Data-Centric Security vs. Database-Level Security

Database Security Encryption

Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities

SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC

Key Management in the Multi-Platform Environment

Description: Objective: Attending students will learn:

EMC CLOUDARRAY BEST PRACTICES: CLOUD STORAGE SECURITY AND DATA INTEGRITY

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

SaaS Security for the Confirmit CustomerSat Software

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Network and Security Controls

Hosted Acronis Backup Cloud. Keep your data safe with our cloud backup service, powered by Acronis

Microsoft SQL Server Security and Auditing Clay Risenhoover ISACA North Texas April 14,

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

End User Devices Security Guidance: Apple OS X 10.10

CONSIDERATIONS BEFORE MOVING TO THE CLOUD

Key & Data Storage on Mobile Devices

Blaze Vault Online Backup. Whitepaper Data Security

Deduplication and Beyond: Optimizing Performance for Backup and Recovery

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure

Securing Data on Microsoft SQL Server 2012

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Security Controls for the Autodesk 360 Managed Services

Encrypting Sensitive Data in Oracle E-Business Suite

The EVault Portfolio

Secure Network Communications FIPS Non Proprietary Security Policy

ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT

Password Management Evaluation Guide for Businesses

Ensuring the security of your mobile business intelligence

Application Design and Development

MS-55096: Securing Data on Microsoft SQL Server 2012

Deploying EFS: Part 1

SSL A discussion of the Secure Socket Layer

Encryption Doesn t Always Protect Your Data. Presented by: Joe Sturonas PKWARE

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Decrypting Enterprise Storage Security

CP003 Azure SQL Database V12 updates and comparison with SQL Server

Secure Web Access Solution

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

Big Data, Big Security:

Securing PostgreSQL From External Attack

SWFP: Secure Web Feed Protocol

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

SQL Server on Azure An e2e Overview. Nosheen Syed Principal Group Program Manager Microsoft

Securing Data in Oracle Database 12c

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Ahsay Online Backup. Whitepaper Data Security

Preface. Microsoft Office Sharepoint Server 2007 Integration Guide SafeNet, Inc. All rights reserved. Part Number: (Rev A, 06/2009)

Remote Access Security

Integrating F5 Application Delivery Solutions with VMware View 4.5

How To Use Pki On A Pc (For A Non-Profit)

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

Application Compatibility Best Practices for Remote Desktop Services

ShareSync from LR Associates Inc. A business-grade file sync and share service that meets the needs of BOTH users and administrators.

High Security Online Backup. A Cyphertite White Paper February, Cloud-Based Backup Storage Threat Models

One Solution for Real-Time Data protection, Disaster Recovery & Migration

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

White Paper How Noah Mobile uses Microsoft Azure Core Services

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

SafeNet DataSecure vs. Native Oracle Encryption

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

WIRELESS LAN SECURITY FUNDAMENTALS

Protecting GoldMine CRM database with DbDefence

The Seven Habits of State-of-the-Art Mobile App Security

Complying with PCI Data Security

WHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW

BANKING SECURITY and COMPLIANCE

Kentico CMS security facts

McAfee Firewall Enterprise 8.2.1

PCI Data Security. Meeting the Challenges of PCI DSS Payment Card Security

SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions

TABLE OF CONTENTS NETWORK SECURITY 2...1

Our Key Security Features Are:

Data Security using Encryption in SwiftStack

2007 Microsoft Office System Document Encryption

Securing Information in LiveBackup

Transcription:

Protecting Your Data With Encryption Ed Leighton-Dick Kingfisher Technologies About Me Email: ed@leightondick.com Blog: edleightondick.com Twitter: @eleightondick 1

Agenda Why should we use encryption? Three general types In-Column At-Rest In-Transit Protecting Your Keys WHY SHOULD WE USE ENCRYPTION? 2

Internet Router Firewall IDS March 17, 2015 In 2014, approximately one billion records of personally identifiable information (PII) were leaked online, according to IBM X- Force. The majority of these records were stolen from US companies. 3

Anthem Inc. stored the Social Security numbers of 80 million customers without encrypting them, the result of what a person familiar with the matter described as a difficult balancing act between protecting the information and making it useful. (The Wall Street Journal, February 5, 2015) Why should we use encryption? Encryption protects against mass data theft which keeps the company off the front page All attacks aren t mitigated by encryption Theft by authorized users Social engineering attacks 4

Your Goals 1. Make your company a harder target than someone else 2. Make stolen data useless without expending significant resources (see #1) This sounds hard and it is! but not as hard as you think Built-in support Day-to-day management is minimal 5

IN-COLUMN ENCRYPTION Hashes Very fast One-way encryption Encrypted phrase cannot be derived directly Commonly used for passwords or comparisons 6

Hashes in SQL Server HASHBYTES VARBINARY output Algorithms Use SHA2_256 or SHA2_512 when possible 5 other algorithms available for compatibility WARNING: Some older algorithms have been compromised! Longer keys => Harder to crack Hashes in SQL Server PWDENCRYPT/PWDCOMPARE Deprecated Uses that SQL Server version s password hashing algorithm Commonly used to check for weak or blank passwords in sys.sql_logins 7

DEMO: HASH ENCRYPTION Symmetric Keys Fast Same key (password) encrypts and decrypts Commonly used for securing data Should be secured by another key Can be encrypted by multiple protections at the same time Cannot be backed up But same password => same symmetric key 8

Symmetric Keys in SQL Server CREATE SYMMETRIC KEY Use AES algorithms when possible RC4, RC4_128, DESX deprecated Encrypt with password or other key Cannot be backed up Asymmetric Keys Slow Public/private key pair Public key encrypts (Can be safely shared) Private key decrypts Used to encrypt symmetric keys, sign data Not recommended for securing data due to speed 9

Asymmetric Keys in SQL Server CREATE ASYMMETRIC KEY Encrypt using Password Certificate Asymmetric key Can be imported.sn file (Strong Name utility) Executable file Assembly Certificates Specific type of asymmetric key X.509v3 standard compliant Code-signing ( Authenticode ) Has expiration date Can be imported Can be exported Uses Encrypt symmetric keys Secure and/or encrypt connections Sign packages 10

Certificates in SQL Server CREATE CERTIFICATE Encrypt using password (optional) Prevents automatic decryption by master key Can be imported.cer file (makecert utility).sn file (Strong Name utility) Assembly Authenticode certificate from third-party Can be created with or without private key Expiration date not checked by encryption, signing functions DEMO: IN-COLUMN ENCRYPTION 11

Database Master Key Can be encrypted by multiple passwords Automatically decrypted Used to encrypt keys in database Symmetric keys Asymmetric keys Certificates Service Master Key Stored in master database Automatically created when first required Derived from SQL Server service account Cannot be directly changed Can be regenerated Can be restored to a different machine Used to encrypt database master keys 12

SQL Server s Encryption Hierarchy Source: MSDN (http://bit.ly/1exdgly) AT-REST ENCRYPTION 13

Backup Encryption Introduced with SQL Server 2014 Added to SQL 2012 SP1 CU4 Older versions cannot read encrypted backups Backup to Windows Azure Tool for older versions (TechNet: http://bit.ly/1cgz5xe) Backup Encryption Requires valid certificate in master Used to create/secure symmetric key Original certificate must be present when restoring 14

DEMO: BACKUP ENCRYPTION Transparent Data Encryption (TDE) What it does Protects data on disk No application changes required What it doesn t do Protect against pages being read from cache Protect against queries by authorized users 15

Transparent Data Encryption (TDE) Requires valid certificate in master Used to create/secure symmetric key ( database encryption key ) Certificate used to encrypt database must be present to restore database Transparent Data Encryption (TDE) 1. Pages encrypted 2. Checksum applied Buffer Pool Buffer Pool 3. Checksum verified 4. Pages decrypted 16

Transparent Data Encryption (TDE) Pages are encrypted when flushed to disk Existing pages are encrypted in the background Pages are decrypted when read Side effects Transaction logs are encrypted TEMPDB is encrypted Backups are encrypted Limitations of TDE Enterprise Edition only Small impact on CPU utilization Instant File Initialization is not used FILESTREAM is not encrypted 17

Monitoring TDE sys.dm_database_encryption_keys Status codes (MSDN - http://bit.ly/1itsypm) 0 = No key;; unencrypted 1 = Unencrypted 2 = Encryption in progress 3 = Encrypted 4 = Key change in progress 5 = Decryption in progress 6 = Protection (certificate) change in progress DEMO: TRANSPARENT DATA ENCRYPTION 18

IN-TRANSIT ENCRYPTION In-Transit Encryption SSL available natively IPSec (VPN) generally recommended Persistent tunnel => Less overhead 19

PROTECTING YOUR KEYS December 4, 2014 December 10, 2014 20

Protect Your Keys! Lost keys = Lost data Any encryption can be broken if the attacker gets the key! Protecting Your Keys Always backup keys to a secure location No unnecessary access! Always backup master keys! Always use a strong password to secure key files Protect the password Use EKM, if available 21

Extensible Key Management (EKM) Appliances that generate, store, and manage keys No one person has unfettered access Used for Separation of duties Simplified key management Cloud Azure Key Vault (preview) Townsend Security, SafeNet Amazon (not compatible with SQL Server) REVIEW 22

4/15/15 Review It is not possible with today s technology to completely eliminate the possibility of a successful breach Encryption mitigates intrusions by making stolen data useless Encryption is readily available Use the tools at your disposal! 23

Any Questions? Email: ed@leightondick.com Blog: edleightondick.com Twitter: @eleightondick Thank you for attending! Please remember to fill out your comment cards 24