Content deleted Content added
Neil Weicher (talk | contribs) |
Victor.rich (talk | contribs) |
||
(17 intermediate revisions by 10 users not shown) | |||
Line 1:
{{more footnotes|date=March 2015}}
'''Transparent
Microsoft offers TDE as part of its [[Microsoft SQL Server]] 2008, 2008 R2, 2012, 2014, 2016, 2017 and
IBM offers TDE as part of [[IBM Db2|Db2]] as of version 10.5 fixpack 5.<ref>{{Cite web|url=https://www.ibm.com/support/knowledgecenter/SSEPGG_10.5.0/com.ibm.db2.luw.wn.doc/doc/c0061179.html|title = Fix pack summary| website=[[IBM]] }}</ref>
Oracle requires the [[Oracle Advanced Security]] option for Oracle 10g and 11g to enable TDE.{{
The same key is used to encrypt columns in a table, regardless of the number of columns to be encrypted. These encryption keys are encrypted using the database server master key and are stored in a dictionary table in the database.
Line 12:
== Microsoft SQL Server TDE ==
SQL Server utilizes an encryption hierarchy that enables databases to be shared within a cluster or migrated to other instances without re-encrypting them. The hierarchy consists of a combination of symmetric and asymmetric ciphers:<ref>[https://technet.microsoft.com/en-us/library/bb934049(v=sql.110).aspx "Transparent Data Encryption (TDE)"] {{Webarchive|url=https://web.archive.org/web/20160329054424/https://technet.microsoft.com/en-us/library/bb934049(v=sql.110).aspx |date=2016-03-29 }} ''Microsoft TechNet''</ref>
* Windows [[Data Protection API|Data Protection API (DPAPI)]] protects a single instance-wide Service Master Key (SMK).
Line 22:
During database backups, [[Data compression|compression]] occurs after encryption. Due to the fact that strongly encrypted data cannot be significantly compressed, backups of TDE encrypted databases require additional resources.
To enable automatic booting, SQL Server stores the lowest level encryption keys in persistent storage (using the [[Data Protection API|DPAPI]] store). This presents a potential security issue because the stored keys can be directly recovered from a live system or from backups and used to decrypt the databases.<ref>Simon McAuliffe, [
== See also ==
* [[Disk encryption]]
* [[Encryption]]
* [[Hardware
==References==
Line 34 ⟶ 33:
==External links==
* [https://www.easefilter.com/kb/transparent-file-encryption-filter-driver-sdk.htm EaseFilter Transparent File Encryption]
* [https://www.database-encryption.com/ Alternative 3rd party solution for all SQL Server Editions]
* [https://www.netlibsecurity.com/ Another alternative 3rd party solution for all SQL Server Editions]
Line 44:
* http://download.oracle.com/docs/cd/B19306_01/network.102/b14268/asotrans.htm#BABDFHHH
* [https://www.p6r.com/articles/2014/11/22/p6rs-pkcs-11-provider/ P6R's PKCS#11 Provider and Oracle TDE]
* [https://techcommunity.microsoft.com/t5/sql-server/sql-server-2019-standard-edition/ba-p/986121]
[[Category:Disk encryption]]
|