Transparent data encryption: Difference between revisions

Content deleted Content added
Broken reference updated. Author repulished "The Anatomy and (In)Security of Microsoft SQL Server Transparent Data Encryption (TDE), or How to Break TDE" to Medium. Original reference directs to a ___domain squatter.
Yiferan (talk | contribs)
Replaced commercial wording with descriptive wording.
Line 1:
{{more footnotes|date=March 2015}}
'''Transparent Data Encryption''' (often abbreviated to '''TDE''') is a technology employed by [[Microsoft]], [[IBM]] and [[Oracle Corporation|Oracle]] to [[encryption|encrypt]] [[database]] files. TDE offers encryption at file level. TDE solvesenables the problemencryption of protecting [[data at rest]], encrypting databases both on the hard drive and consequently on [[backup]] media. It does not protect [[data in transit]] nor [[data in use]]. Enterprises typically employ TDE to solve compliance issues such as [[PCI DSS]] which require the protection of data at rest.
 
Microsoft offers TDE as part of its [[Microsoft SQL Server]] 2008, 2008 R2, 2012, 2014, 2016, 2017 and 2019.<ref>{{Cite news|url=https://info.townsendsecurity.com/sql-server-tde-vs-cell-level-encryption-a-brief-comparison|title=SQL Server TDE vs CLE|access-date=2017-06-02|language=en}}</ref> TDE was only supported on the Evaluation, Developer, Enterprise and Datacenter editions of Microsoft SQL Server, until it was also made available in the Standard edition for 2019.<ref>[https://techcommunity.microsoft.com/t5/sql-server/sql-server-2019-standard-edition/ba-p/986121 "SQL Server 2019 Standard Edition"]''Microsoft Tech Community''</ref> SQL TDE is supported by [[hardware security module]]s from Thales e-Security, Townsend Security and SafeNet, Inc.