SlideShare a Scribd company logo
1 of 19
John Magnabosco
Database Consultant/Solution Architect – SolutionAvenue
President/Co-Founder - Indianapolis Professional Association for SQL Server
Coordinator/Co-Founder – IndyTechFest

Visit my blog at:
         www.Simple-Talk.com
Download sample scripts and these slides at:
         www.johnmagnabosco.com
Today’s Presentation

         1.   Get To Know Your Challenges with Sensitive Data
         2.   What Is Sensitive Data?
         3.   Why Protect Sensitive Data?
         4.   How To Secure Sensitive Data
              With Code Demonstrations!
What is Sensitive Data?

         Government Assigned ID Data


         Biometric Data


         Medical Data and History
         Health Insurance Portability and Accountability Act (HIPAA)


         Student Education Data
         Federal Educational Rights and Privacy Act (FERPA)
What is Sensitive Data?

         Employment Data


         Communication Data
         Electronic Communications Privacy Act (ECPA)


         Financial Data
         Right to Financial Privacy Act (RFPA)


         Intellectual Property Data
Why Protect Sensitive Data?

         Guard Against Identity Theft and Fraud


         Ensure Privacy


         Comply with Regulatory Requirements


         Secure Competitive Advantage
Group Dynamics

        Birth Date + Birth Location + Name = Certified Copy of Birth Cert.


        Ancestor Name + Credit Card No. = Access To Credit Card Account


        Vacation Plans + Address = Stolen Personal Property from Home


        Pet Name + User Name = Password for E-Mail Account
How To Secure Sensitive Data

         Data Classification

         1.   Identify classes of sensitivity
              •   Public, Internal, Confidential, Top Secret
         2.   Define security policies according to these classes*
              •   This will likely be defined by CIO or ISO rather than DBA
         3.   Assign a classification to each column in the tables
              •   Document with Extended Properties
         4.   Assign users/roles accordingly
              •   Access to database objects, views and tables
How To Secure Sensitive Data
  Capturing Sensitivity Classification with Extended Properties




       Demonstration…
How To Secure Sensitive Data

         Data Handling Policies

         1.   Consider what data can be printed
              •   Internal documents, bulk mailing, individual mailing
         2.   Consider what data can be displayed on screen
              •   Based upon sensitivity classification
         3.   Consider what data can be stored externally from db
              •   Excel spreadsheets, files on disk/thumb drive
         4.   Determine display alternatives for sensitive data
              •   Partial display, no display, disclosed upon entry of pass code
Sample Nightmare
• 12/31/2008: A State University
     Publishes names and SSN of 18,000 current/former students on the Internet.
•12/23/2008: A Popular Soda Company
     Missing portable device containing employee names and SSN.
• 12/23/2008: An Internet Telephone Provider
     A vendor stored customer credit card, bank account, names, addresses on Google Notebook.
• 12/16/2008: A Large Investment Brokerage Firm
     Stolen laptop containing SSN, names and addresses of clients.
• 12/15/2008: A State Department of Revenue
     Names, addresses and SSN of individuals exposed in mailing error.
• 12/04/2008: A State University
     A spreadsheet containing names, addresses and SSN of students published on the Internet.
• 12/02/2008: A State Agency of Workforce
     Names and SSN of 250,000 found on the Internet through search engine.
 These items were provided through the OSF Data Loss RSS Feed: http://datalossdb.org/latest_incidents.rss
How To Secure Sensitive Data

         Data Backup Storage

         1.   Store backup media in a secure location
              •   Offsite storage, room with limited access, fireproof
         2.   Store encryption key backups separately
              •   Not on same media, not in same location
         3.   Consider utilizing Transparent Data Encryption
              •   This feature encrypts the physical data files
         4.   Store data no longer than required
              •   Establish a retention schedule. Destroy items on schedule.
How To Secure Sensitive Data

         Encryption

         1.   Consider utilizing Cell-Level Encryption
              •   Provides granular protection of data for each column
         2.   Consider utilizing Transparent Data Encryption
              •   Protects data files, transaction logs and backup files
         3.   Manage key lifecycles
              •   Encryption keys become weak over time.
         4.   Store key backups separate from db backups
              •   The db cannot be decrypted without these keys.
How To Secure Sensitive Data
  Using Cell-Level Encryption and Transparent Data Encryption




       Demonstration…
How To Secure Sensitive Data

         Other Methods

         1.   HashBytes() method
              •   Encryption without the messy decryption
         2.   Masking data
              •   Replace part of the data with ‘X’ or other character
         3.   Coding data
              •   Use a number to represent data
         4.   Don’t store more data than you need
              •   Why increase the cost of storing data unnecessarily
How To Secure Sensitive Data
  Using Other Data Protection Methods




       Demonstration…
In Summary

       1.    Define Sensitive Data
       2.    Understand Why Sensitive Data Must Be Protected
       3.    Classify Data
       4.    Define Data Handling Policies
       5.    Include Back Up Strategies in Protecting Sensitive Data
       6.    Consider Encryption and Other Protection Methods
Questions…
…and in some cases, answers.
Additional Resources
 Data Loss Resources:
      OSF Data Loss RSS Feed
        http://datalossdb.org/latest_incidents.rss

 Additional TDE Resources:
     MSDN: Understanding TDE (Article)
        http://msdn.microsoft.com/en-us/library/bb934049.aspx
     My Blog: Check out my series on TDE
        http://www.simple-talk.com/community/blogs/johnm/default.aspx

 Additional General Encryption Resources:
       MSDN: SQL Server Encryption
         http://msdn.microsoft.com/en-us/library/bb510663.aspx
 Have More Questions?
      My E-Mail: john_magnabosco@live.com

More Related Content

What's hot

Information retrieval s
Information retrieval sInformation retrieval s
Information retrieval s
silambu111
 
Paul2 ecn 2012
Paul2 ecn 2012Paul2 ecn 2012
Paul2 ecn 2012
ECNOfficer
 
Digital Forensics Overview
Digital Forensics OverviewDigital Forensics Overview
Digital Forensics Overview
Mathew Shelby
 
INFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.LINFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.L
anujessy
 
Bioinformatioc: Information Retrieval - II
Bioinformatioc: Information Retrieval - IIBioinformatioc: Information Retrieval - II
Bioinformatioc: Information Retrieval - II
Dr. Rupak Chakravarty
 
Lect 08 computer security and privacy 2 4 q
Lect 08 computer security and privacy 2 4 qLect 08 computer security and privacy 2 4 q
Lect 08 computer security and privacy 2 4 q
Ramy Eltarras
 
Privacy and security 815
Privacy and security 815Privacy and security 815
Privacy and security 815
Rachel
 

What's hot (20)

Information retrieval s
Information retrieval sInformation retrieval s
Information retrieval s
 
Concepts of Data Bases
Concepts of Data BasesConcepts of Data Bases
Concepts of Data Bases
 
Information retrieval system!
Information retrieval system!Information retrieval system!
Information retrieval system!
 
CURRENT AND FUTURE TRENDS IN DBMS
CURRENT AND FUTURE TRENDS IN DBMSCURRENT AND FUTURE TRENDS IN DBMS
CURRENT AND FUTURE TRENDS IN DBMS
 
Paul2 ecn 2012
Paul2 ecn 2012Paul2 ecn 2012
Paul2 ecn 2012
 
Digital Forensics Overview
Digital Forensics OverviewDigital Forensics Overview
Digital Forensics Overview
 
INFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.LINFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.L
 
GDPR Datatags DANS Oct 2017
GDPR Datatags DANS Oct 2017GDPR Datatags DANS Oct 2017
GDPR Datatags DANS Oct 2017
 
E discovery mallareddy 20160213
E discovery mallareddy 20160213E discovery mallareddy 20160213
E discovery mallareddy 20160213
 
Multimedia database
Multimedia databaseMultimedia database
Multimedia database
 
Bioinformatioc: Information Retrieval - II
Bioinformatioc: Information Retrieval - IIBioinformatioc: Information Retrieval - II
Bioinformatioc: Information Retrieval - II
 
INFORMATION RETRIEVAL ‎AND DISSEMINATION
INFORMATION RETRIEVAL ‎AND DISSEMINATIONINFORMATION RETRIEVAL ‎AND DISSEMINATION
INFORMATION RETRIEVAL ‎AND DISSEMINATION
 
Lect 08 computer security and privacy 2 4 q
Lect 08 computer security and privacy 2 4 qLect 08 computer security and privacy 2 4 q
Lect 08 computer security and privacy 2 4 q
 
Lecture 11 Unstructured Data and the Data Warehouse
Lecture 11 Unstructured Data and the Data WarehouseLecture 11 Unstructured Data and the Data Warehouse
Lecture 11 Unstructured Data and the Data Warehouse
 
Unit 2
Unit 2Unit 2
Unit 2
 
Information storage and retrieval
Information storage and  retrievalInformation storage and  retrieval
Information storage and retrieval
 
Privacy and security 815
Privacy and security 815Privacy and security 815
Privacy and security 815
 
Metadata lecture 1, intro
Metadata lecture 1, introMetadata lecture 1, intro
Metadata lecture 1, intro
 
Information Storage and Retrieval system (ISRS)
Information Storage and Retrieval system (ISRS)Information Storage and Retrieval system (ISRS)
Information Storage and Retrieval system (ISRS)
 
Multimedia Database
Multimedia DatabaseMultimedia Database
Multimedia Database
 

Similar to Sensitive data - SQL Saturday Tampa

Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
Nicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
Nicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
Nicholas Davis
 
BUS105Business Information SystemsWorkshop Week 3.docx
BUS105Business Information SystemsWorkshop Week 3.docxBUS105Business Information SystemsWorkshop Week 3.docx
BUS105Business Information SystemsWorkshop Week 3.docx
jasoninnes20
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletion
snehal1010
 

Similar to Sensitive data - SQL Saturday Tampa (20)

Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data mining
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
Preparing research data for sharing
Preparing research data for sharingPreparing research data for sharing
Preparing research data for sharing
 
DCSF19 Containerized Databases for Enterprise Applications
DCSF19 Containerized Databases for Enterprise ApplicationsDCSF19 Containerized Databases for Enterprise Applications
DCSF19 Containerized Databases for Enterprise Applications
 
20170222 ku-librarians勉強会 #211 :海外研修報告:英国大学図書館を北から南へ巡る旅
20170222 ku-librarians勉強会 #211 :海外研修報告:英国大学図書館を北から南へ巡る旅20170222 ku-librarians勉強会 #211 :海外研修報告:英国大学図書館を北から南へ巡る旅
20170222 ku-librarians勉強会 #211 :海外研修報告:英国大学図書館を北から南へ巡る旅
 
Trust in a Digital World
Trust in a Digital WorldTrust in a Digital World
Trust in a Digital World
 
Introduction to Research Data Management for postgraduate students
Introduction to Research Data Management for postgraduate studentsIntroduction to Research Data Management for postgraduate students
Introduction to Research Data Management for postgraduate students
 
BUS105Business Information SystemsWorkshop Week 3.docx
BUS105Business Information SystemsWorkshop Week 3.docxBUS105Business Information SystemsWorkshop Week 3.docx
BUS105Business Information SystemsWorkshop Week 3.docx
 
Research Data Management for Qualitative Researchers
Research Data Management for Qualitative ResearchersResearch Data Management for Qualitative Researchers
Research Data Management for Qualitative Researchers
 
Database Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantDatabase Security Presentation Why database Security is important
Database Security Presentation Why database Security is important
 
Exploring Data Privacy - SQL Saturday Louisville 2011
Exploring Data Privacy - SQL Saturday Louisville 2011Exploring Data Privacy - SQL Saturday Louisville 2011
Exploring Data Privacy - SQL Saturday Louisville 2011
 
Conquering Chaos in the Age of Networked Science: Research Data Management
Conquering Chaos in the Age of Networked Science: Research Data ManagementConquering Chaos in the Age of Networked Science: Research Data Management
Conquering Chaos in the Age of Networked Science: Research Data Management
 
Data security in clouds
Data security in cloudsData security in clouds
Data security in clouds
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletion
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
Cyber security
Cyber securityCyber security
Cyber security
 
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTSTECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
 
Managing data throughout the research lifecycle
Managing data throughout the research lifecycleManaging data throughout the research lifecycle
Managing data throughout the research lifecycle
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Sensitive data - SQL Saturday Tampa

  • 1. John Magnabosco Database Consultant/Solution Architect – SolutionAvenue President/Co-Founder - Indianapolis Professional Association for SQL Server Coordinator/Co-Founder – IndyTechFest Visit my blog at: www.Simple-Talk.com Download sample scripts and these slides at: www.johnmagnabosco.com
  • 2. Today’s Presentation 1. Get To Know Your Challenges with Sensitive Data 2. What Is Sensitive Data? 3. Why Protect Sensitive Data? 4. How To Secure Sensitive Data With Code Demonstrations!
  • 3. What is Sensitive Data? Government Assigned ID Data Biometric Data Medical Data and History Health Insurance Portability and Accountability Act (HIPAA) Student Education Data Federal Educational Rights and Privacy Act (FERPA)
  • 4. What is Sensitive Data? Employment Data Communication Data Electronic Communications Privacy Act (ECPA) Financial Data Right to Financial Privacy Act (RFPA) Intellectual Property Data
  • 5. Why Protect Sensitive Data? Guard Against Identity Theft and Fraud Ensure Privacy Comply with Regulatory Requirements Secure Competitive Advantage
  • 6. Group Dynamics Birth Date + Birth Location + Name = Certified Copy of Birth Cert. Ancestor Name + Credit Card No. = Access To Credit Card Account Vacation Plans + Address = Stolen Personal Property from Home Pet Name + User Name = Password for E-Mail Account
  • 7. How To Secure Sensitive Data Data Classification 1. Identify classes of sensitivity • Public, Internal, Confidential, Top Secret 2. Define security policies according to these classes* • This will likely be defined by CIO or ISO rather than DBA 3. Assign a classification to each column in the tables • Document with Extended Properties 4. Assign users/roles accordingly • Access to database objects, views and tables
  • 8. How To Secure Sensitive Data Capturing Sensitivity Classification with Extended Properties Demonstration…
  • 9. How To Secure Sensitive Data Data Handling Policies 1. Consider what data can be printed • Internal documents, bulk mailing, individual mailing 2. Consider what data can be displayed on screen • Based upon sensitivity classification 3. Consider what data can be stored externally from db • Excel spreadsheets, files on disk/thumb drive 4. Determine display alternatives for sensitive data • Partial display, no display, disclosed upon entry of pass code
  • 10. Sample Nightmare • 12/31/2008: A State University Publishes names and SSN of 18,000 current/former students on the Internet. •12/23/2008: A Popular Soda Company Missing portable device containing employee names and SSN. • 12/23/2008: An Internet Telephone Provider A vendor stored customer credit card, bank account, names, addresses on Google Notebook. • 12/16/2008: A Large Investment Brokerage Firm Stolen laptop containing SSN, names and addresses of clients. • 12/15/2008: A State Department of Revenue Names, addresses and SSN of individuals exposed in mailing error. • 12/04/2008: A State University A spreadsheet containing names, addresses and SSN of students published on the Internet. • 12/02/2008: A State Agency of Workforce Names and SSN of 250,000 found on the Internet through search engine. These items were provided through the OSF Data Loss RSS Feed: http://datalossdb.org/latest_incidents.rss
  • 11. How To Secure Sensitive Data Data Backup Storage 1. Store backup media in a secure location • Offsite storage, room with limited access, fireproof 2. Store encryption key backups separately • Not on same media, not in same location 3. Consider utilizing Transparent Data Encryption • This feature encrypts the physical data files 4. Store data no longer than required • Establish a retention schedule. Destroy items on schedule.
  • 12.
  • 13. How To Secure Sensitive Data Encryption 1. Consider utilizing Cell-Level Encryption • Provides granular protection of data for each column 2. Consider utilizing Transparent Data Encryption • Protects data files, transaction logs and backup files 3. Manage key lifecycles • Encryption keys become weak over time. 4. Store key backups separate from db backups • The db cannot be decrypted without these keys.
  • 14. How To Secure Sensitive Data Using Cell-Level Encryption and Transparent Data Encryption Demonstration…
  • 15. How To Secure Sensitive Data Other Methods 1. HashBytes() method • Encryption without the messy decryption 2. Masking data • Replace part of the data with ‘X’ or other character 3. Coding data • Use a number to represent data 4. Don’t store more data than you need • Why increase the cost of storing data unnecessarily
  • 16. How To Secure Sensitive Data Using Other Data Protection Methods Demonstration…
  • 17. In Summary 1. Define Sensitive Data 2. Understand Why Sensitive Data Must Be Protected 3. Classify Data 4. Define Data Handling Policies 5. Include Back Up Strategies in Protecting Sensitive Data 6. Consider Encryption and Other Protection Methods
  • 18. Questions… …and in some cases, answers.
  • 19. Additional Resources Data Loss Resources: OSF Data Loss RSS Feed http://datalossdb.org/latest_incidents.rss Additional TDE Resources: MSDN: Understanding TDE (Article) http://msdn.microsoft.com/en-us/library/bb934049.aspx My Blog: Check out my series on TDE http://www.simple-talk.com/community/blogs/johnm/default.aspx Additional General Encryption Resources: MSDN: SQL Server Encryption http://msdn.microsoft.com/en-us/library/bb510663.aspx Have More Questions? My E-Mail: john_magnabosco@live.com