SlideShare a Scribd company logo
1 of 28
Protecting your SharePoint Content with SQL Server 2008 Transparent Database Encryption Michael Noel Partner Convergent Computing SESSION CODE: #AIT008 (c) 2011 Microsoft. All rights reserved.
Michael Noel Sydney Brisbane Canberra Tasmania Katoomba Skippy Hungry Quokkas Bondi Melbourne 12 (11) Apostles Adelaide Perth Great to be back in Beautiful Australia!
Session Overview Discussion of various Encryption Options Cell-level Encryption File-Level Encryption (Bitlocker, EFS) Transparent Data Encryption Active Directory Rights Management Services (AD RMS) TDE Overview TDE for SharePoint Content Databases Demo of TDE (c) 2011 Microsoft. All rights reserved.
The problem? Unencrypted Data Data Stored Unencrypted on a SQL Server Stolen Backups or Administrators of a Server can have access to all SharePoint Content Governmental and Industry Regulation Restricts Storage of Content Unencrypted (c) 2011 Microsoft. All rights reserved.
The Solution? Data Encryption Many Options, same concept Files are stored in unreadable format, using PKI based encryption Some Options require Application Support (i.e. Cell-level Encryption), which SharePoint doesn't support (c) 2011 Microsoft. All rights reserved.
Cell Level Encryption Available with either SQL 2005 or SQL 2008 Encrypts individual cells in a database Requires a password to access the cell Requires that columns be changed from their original data type to varbinary Advantage is that only specific info is encrypted Disadvantage is that you cannot use this for SharePoint Databases (c) 2011 Microsoft. All rights reserved.
File-level Encryption Two forms, older Encrypting File System (EFS) and Bitlocker EFS encrypts data at the File Level Bitlocker encrypts data at the Volume Level Bitlocker Encrypts every file on the disk, not just database files Could be used together with TDE (c) 2011 Microsoft. All rights reserved.
File-level Encryption Biggest drawback: Heavy Performance Hit No support for prefetch or asynchrouous I/O I/O operations can become bottlenecked and serialized Doesn't protect the volume when accessed across the network Only really feasible in very small workgroup scenarios, rarely applies to SharePoint (c) 2011 Microsoft. All rights reserved.
Active Directory Rights Management Services (AD RMS) Encrypts content upon access and removal, not in storage Provides Rights Protection, which can expire a document or limit the ability to: Print Cut/Paste Programmatically access Save As a different file Can be used with TDE (c) 2011 Microsoft. All rights reserved.
SQL Transparent Data Encryption (TDE) New in SQL Server 2008 Only Available with the Enterprise Edition Seamless Encryption of Individual Databases Transparent to Applications, including SharePoint (c) 2011 Microsoft. All rights reserved.
SQL Transparent Data Encryption (TDE) When enabled, encrypts Database, log file, any info written to TempDB, snapshots, backups, and Mirrored DB instance, if applicable Operates at the I/O level through the buffer pool, so any data written into the MDF is encrypted Can be selectively enabled on specific databases Backups cannot be restored to other servers without a copy of the private key, stolen MDF files are worthless to the thief Easier Administration, Minimal server resources required (3%-5% performance hit) (c) 2011 Microsoft. All rights reserved.
Potential TDE Limitations	 Does not encrypt the Communication Channel (IPSec can be added) Does not protect data in memory (DBAs could access) Cannot take advantage of SQL 2008 Backup Compression TempDB is encrypted for the entire instance, even if only one DB is enabled for TDE, which can have a peprformance effect for other DBs Replication or FILESTREAM data is not encrypted when TDE is enabled (i.e. RBS BLOBs not encrypted) (c) 2011 Microsoft. All rights reserved.
How TDE Works Windows Data Protection API (DPAPI) at root of encryption key hierarchy DPAPI creates and protects Service Master Key (SMK) during SQL Setup SMK used to protect Database Master Key (DMK) DMK used to protect Certificate and Asymmetric Key Certificate and Asymmetric Key used to create Database Encryption Key (DEK) (c) 2011 Microsoft. All rights reserved.
(c) 2011 Microsoft. All rights reserved. Key and Cert Hierarchy DPAPI Encrypts SMK SMK encrypts the DMK for master DB          Service Master Key                       Data Protection API (DPAPI)             Database Master Key Certificate                    Database Encryption Key SQL Instance Level Windows OS Level master DB Level master DB Level Content DB Level DMK creates Cert in master DB Certificate Encrypts DEK in Content DB DEK used to encrypt Content DB
High Level Steps to Enable TDE Create the DMK Create the TDE Cert Backup the TDE Cert Create the DEK Encrypt the DB Monitor Progress (c) 2011 Microsoft. All rights reserved.
Creating the Database Master Key (DMK) Symmetric key used to protect private keys and asymmetric keys Protected itself by Service Master Key (SMK), which is created by SQL Server setup Use syntax as follows: USE master; GO CREATE MASTER KEY ENCRYPTION BY PASSWORD = 'CrypticTDEpw4CompanyABC'; GO (c) 2011 Microsoft. All rights reserved.
Create Certificate Protected by DMK Protected by the DMK Used to protect the database encryption key Use syntax as follows: USE master; GO CREATE CERTIFICATE CompanyABCtdeCert WITH SUBJECT = 'CompanyABC TDE Certificate' ; GO (c) 2011 Microsoft. All rights reserved.
Backup Master Key and Cert Without a backup, data can be lost Backup creates two files, the Cert backup and the Private Key File Use following syntax: USE master; GO BACKUP CERTIFICATE CompanyABCtdeCert TO FILE = 'c:ackupompanyABCtdeCERT.cer'  WITH PRIVATE KEY (  FILE = 'c:ackupompanyABCtdeDECert.pvk',  ENCRYPTION BY PASSWORD = 'CrypticTDEpw4CompanyABC!' ); GO (c) 2011 Microsoft. All rights reserved.
Create a Database Encryption Key (DEK) DEK is used to encrypt specific database One created for each database Encryption method can be chosen for each DEK Use following syntax: USE SharePointContentDB; GO CREATE DATABASE ENCRYPTION KEY  WITH ALGORITHM = AES_256  ENCRYPTION BY SERVER CERTIFICATE CompanyABCtdeCert GO (c) 2011 Microsoft. All rights reserved.
Enable TDE Data encryption will begin after running command Size of DB will determine time it will take, can be lengthy and could cause user blocking Use following syntax: USE SharePointContentDB GO ALTER DATABASE SharePointContentDB SET ENCRYPTION ON GO (c) 2011 Microsoft. All rights reserved.
Monitor TDE Progress State is Returned State of 2 = Encryption Begun State of 3 = Encryption Complete Use following syntax: USE SharePointContentDB GO SELECT * FROM sys.dm_database_encryption_keys WHERE encryption_state = 3; GO (c) 2011 Microsoft. All rights reserved.
Restoring Encrypted DB to Another Server Step 1: Create new Master Key on Target Server (Does not need to match source master key) Step 2: Backup Cert and Private Key from Source Step 3: Restore Cert and Private Key onto Target (No need to export the DEK as it is part of the backup) USE master; GO CREATE CERTIFICATE CompanyABCtdeCert FROM FILE = 'C:estoreompanyABCtdeCert.cer' WITH PRIVATE KEY ( FILE = 'C:estoreompanyABCtdeCert.pvk' , DECRYPTION BY PASSWORD = 'CrypticTDEpw4CompanyABC!' ) Step 4: Restore DB (c) 2011 Microsoft. All rights reserved.
Demo Encrypting SharePoint Content DBs using Transparent Data Encryption
Complete an Evaluation online and enter to WIN these prizes! <Prizes & Process TBC> (c) 2011 Microsoft. All rights reserved.
Thanks for attending!Questions? Michael Noel Twitter: @MichaelTNoel www.cco.com Slides: slideshare.net/michaeltnoel
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation.  Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.  MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. (c) 2011 Microsoft. All rights reserved.
www.msteched.com/Australia Sessions On-Demand & Community www.microsoft.com/australia/learning Microsoft Certification & Training Resources http:// technet.microsoft.com/en-au Resources for IT Professionals http://msdn.microsoft.com/en-au Resources for Developers Resources (c) 2011 Microsoft. All rights reserved.

More Related Content

What's hot

Security Multitenant
Security MultitenantSecurity Multitenant
Security Multitenant
Arush Jain
 
active-directory-domain-services
active-directory-domain-servicesactive-directory-domain-services
active-directory-domain-services
202066
 
Active directory ds ws2008 r2
Active directory ds ws2008 r2Active directory ds ws2008 r2
Active directory ds ws2008 r2
MICTT Palma
 
Stellar file repair
Stellar file repairStellar file repair
Stellar file repair
Laren
 

What's hot (18)

SQL Server Column Based Encryption
SQL Server Column Based EncryptionSQL Server Column Based Encryption
SQL Server Column Based Encryption
 
Sql Server 2016 Always Encrypted
Sql Server 2016 Always EncryptedSql Server 2016 Always Encrypted
Sql Server 2016 Always Encrypted
 
SSDs: A New Generation of Storage Devices
SSDs: A New Generation of Storage DevicesSSDs: A New Generation of Storage Devices
SSDs: A New Generation of Storage Devices
 
Virtuoso ODBC Driver Configuration & Usage (Windows)
Virtuoso ODBC Driver Configuration & Usage (Windows)Virtuoso ODBC Driver Configuration & Usage (Windows)
Virtuoso ODBC Driver Configuration & Usage (Windows)
 
Security Multitenant
Security MultitenantSecurity Multitenant
Security Multitenant
 
SQL Server 2008 Positioning
SQL Server 2008 PositioningSQL Server 2008 Positioning
SQL Server 2008 Positioning
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL Server
 
Oracle database 12c_and_DevOps
Oracle database 12c_and_DevOpsOracle database 12c_and_DevOps
Oracle database 12c_and_DevOps
 
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyÚvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastruktury
 
Oracle on Azure at Windows Azure Conference 2014
Oracle on Azure at Windows Azure Conference 2014Oracle on Azure at Windows Azure Conference 2014
Oracle on Azure at Windows Azure Conference 2014
 
active-directory-domain-services
active-directory-domain-servicesactive-directory-domain-services
active-directory-domain-services
 
WINDOWS SERVER 2008
WINDOWS SERVER 2008WINDOWS SERVER 2008
WINDOWS SERVER 2008
 
Presentation about servers
Presentation about serversPresentation about servers
Presentation about servers
 
Active directory ds ws2008 r2
Active directory ds ws2008 r2Active directory ds ws2008 r2
Active directory ds ws2008 r2
 
Trivadis TechEvent 2017 Kerberos and Databases a Success by Stefan Oehrli
Trivadis TechEvent 2017 Kerberos and Databases a Success by Stefan OehrliTrivadis TechEvent 2017 Kerberos and Databases a Success by Stefan Oehrli
Trivadis TechEvent 2017 Kerberos and Databases a Success by Stefan Oehrli
 
What is active directory
What is active directoryWhat is active directory
What is active directory
 
Stellar file repair
Stellar file repairStellar file repair
Stellar file repair
 
Oracle Database Vault
Oracle Database VaultOracle Database Vault
Oracle Database Vault
 

Similar to Protecting Your SharePoint Content Databases using SQL Transparent Data Encryption

TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
Michael Noel
 
SPTechCon SFO 2012 - Understanding the Five Layers of SharePoint Security
SPTechCon SFO 2012 - Understanding the Five Layers of SharePoint SecuritySPTechCon SFO 2012 - Understanding the Five Layers of SharePoint Security
SPTechCon SFO 2012 - Understanding the Five Layers of SharePoint Security
Michael Noel
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overview
ukdpe
 
Security for SharePoint in an Insecure World - SharePoint Connections Amsterd...
Security for SharePoint in an Insecure World - SharePoint Connections Amsterd...Security for SharePoint in an Insecure World - SharePoint Connections Amsterd...
Security for SharePoint in an Insecure World - SharePoint Connections Amsterd...
Michael Noel
 
AUSPC 2013 - Understanding the Five Layers of SharePoint Security
AUSPC 2013 - Understanding the Five Layers of SharePoint SecurityAUSPC 2013 - Understanding the Five Layers of SharePoint Security
AUSPC 2013 - Understanding the Five Layers of SharePoint Security
Michael Noel
 
Moving to the cloud azure, office365, and intune - concurrency
Moving to the cloud   azure, office365, and intune - concurrencyMoving to the cloud   azure, office365, and intune - concurrency
Moving to the cloud azure, office365, and intune - concurrency
Concurrency, Inc.
 
SPS Belgium 2012 - End to End Security for SharePoint Farms - Michael Noel
SPS Belgium 2012 - End to End Security for SharePoint Farms - Michael NoelSPS Belgium 2012 - End to End Security for SharePoint Farms - Michael Noel
SPS Belgium 2012 - End to End Security for SharePoint Farms - Michael Noel
Michael Noel
 

Similar to Protecting Your SharePoint Content Databases using SQL Transparent Data Encryption (20)

TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
 
SEASPC 2011 - SharePoint Security in an Insecure World: Understanding the Fiv...
SEASPC 2011 - SharePoint Security in an Insecure World: Understanding the Fiv...SEASPC 2011 - SharePoint Security in an Insecure World: Understanding the Fiv...
SEASPC 2011 - SharePoint Security in an Insecure World: Understanding the Fiv...
 
SPTechCon SFO 2012 - Understanding the Five Layers of SharePoint Security
SPTechCon SFO 2012 - Understanding the Five Layers of SharePoint SecuritySPTechCon SFO 2012 - Understanding the Five Layers of SharePoint Security
SPTechCon SFO 2012 - Understanding the Five Layers of SharePoint Security
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overview
 
Security for SharePoint in an Insecure World - SharePoint Connections Amsterd...
Security for SharePoint in an Insecure World - SharePoint Connections Amsterd...Security for SharePoint in an Insecure World - SharePoint Connections Amsterd...
Security for SharePoint in an Insecure World - SharePoint Connections Amsterd...
 
SharePoint Security in an Insecure World - AUSPC 2012
SharePoint Security in an Insecure World - AUSPC 2012SharePoint Security in an Insecure World - AUSPC 2012
SharePoint Security in an Insecure World - AUSPC 2012
 
Day2
Day2Day2
Day2
 
SQL Server - High availability
SQL Server - High availabilitySQL Server - High availability
SQL Server - High availability
 
AUSPC 2013 - Understanding the Five Layers of SharePoint Security
AUSPC 2013 - Understanding the Five Layers of SharePoint SecurityAUSPC 2013 - Understanding the Five Layers of SharePoint Security
AUSPC 2013 - Understanding the Five Layers of SharePoint Security
 
Getting Started with SQL Server Compact Edition 3.51
Getting Started with SQL Server Compact Edition 3.51Getting Started with SQL Server Compact Edition 3.51
Getting Started with SQL Server Compact Edition 3.51
 
Getting Started with Sql Server Compact Edition
Getting Started with Sql Server Compact EditionGetting Started with Sql Server Compact Edition
Getting Started with Sql Server Compact Edition
 
Moving to the cloud azure, office365, and intune - concurrency
Moving to the cloud   azure, office365, and intune - concurrencyMoving to the cloud   azure, office365, and intune - concurrency
Moving to the cloud azure, office365, and intune - concurrency
 
Sql Server 2008 Security Enhanments
Sql Server 2008 Security EnhanmentsSql Server 2008 Security Enhanments
Sql Server 2008 Security Enhanments
 
SQLCAT - Data and Admin Security
SQLCAT - Data and Admin SecuritySQLCAT - Data and Admin Security
SQLCAT - Data and Admin Security
 
Sql interview question part 10
Sql interview question part 10Sql interview question part 10
Sql interview question part 10
 
Ebook10
Ebook10Ebook10
Ebook10
 
SPS Belgium 2012 - End to End Security for SharePoint Farms - Michael Noel
SPS Belgium 2012 - End to End Security for SharePoint Farms - Michael NoelSPS Belgium 2012 - End to End Security for SharePoint Farms - Michael Noel
SPS Belgium 2012 - End to End Security for SharePoint Farms - Michael Noel
 
System Center 2012 Virtual Machine Manager
System Center 2012 Virtual Machine ManagerSystem Center 2012 Virtual Machine Manager
System Center 2012 Virtual Machine Manager
 
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATAEXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
 
Platform Deep Dive
Platform Deep DivePlatform Deep Dive
Platform Deep Dive
 

More from Michael Noel

Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Michael Noel
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Michael Noel
 
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Michael Noel
 
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
Michael Noel
 
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Michael Noel
 
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Michael Noel
 
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
Michael Noel
 

More from Michael Noel (20)

AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
 
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
 
IT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital BrazzavilleIT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital Brazzaville
 
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
Understanding the Tools and Features of Office 365 : DWT Africa 2018
Understanding the Tools and Features of Office 365 : DWT Africa 2018Understanding the Tools and Features of Office 365 : DWT Africa 2018
Understanding the Tools and Features of Office 365 : DWT Africa 2018
 
SPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep DiveSPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
 
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 MelbourneAzure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
 
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
 
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
 
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
 
Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017
 
Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée
 
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
 
Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015
 
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
 
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
 
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
SQL 2014 AlwaysOn Availability Groups for SharePoint Farms - SPS Sydney 2014
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Protecting Your SharePoint Content Databases using SQL Transparent Data Encryption

  • 1.
  • 2. Protecting your SharePoint Content with SQL Server 2008 Transparent Database Encryption Michael Noel Partner Convergent Computing SESSION CODE: #AIT008 (c) 2011 Microsoft. All rights reserved.
  • 3. Michael Noel Sydney Brisbane Canberra Tasmania Katoomba Skippy Hungry Quokkas Bondi Melbourne 12 (11) Apostles Adelaide Perth Great to be back in Beautiful Australia!
  • 4. Session Overview Discussion of various Encryption Options Cell-level Encryption File-Level Encryption (Bitlocker, EFS) Transparent Data Encryption Active Directory Rights Management Services (AD RMS) TDE Overview TDE for SharePoint Content Databases Demo of TDE (c) 2011 Microsoft. All rights reserved.
  • 5. The problem? Unencrypted Data Data Stored Unencrypted on a SQL Server Stolen Backups or Administrators of a Server can have access to all SharePoint Content Governmental and Industry Regulation Restricts Storage of Content Unencrypted (c) 2011 Microsoft. All rights reserved.
  • 6. The Solution? Data Encryption Many Options, same concept Files are stored in unreadable format, using PKI based encryption Some Options require Application Support (i.e. Cell-level Encryption), which SharePoint doesn't support (c) 2011 Microsoft. All rights reserved.
  • 7. Cell Level Encryption Available with either SQL 2005 or SQL 2008 Encrypts individual cells in a database Requires a password to access the cell Requires that columns be changed from their original data type to varbinary Advantage is that only specific info is encrypted Disadvantage is that you cannot use this for SharePoint Databases (c) 2011 Microsoft. All rights reserved.
  • 8. File-level Encryption Two forms, older Encrypting File System (EFS) and Bitlocker EFS encrypts data at the File Level Bitlocker encrypts data at the Volume Level Bitlocker Encrypts every file on the disk, not just database files Could be used together with TDE (c) 2011 Microsoft. All rights reserved.
  • 9. File-level Encryption Biggest drawback: Heavy Performance Hit No support for prefetch or asynchrouous I/O I/O operations can become bottlenecked and serialized Doesn't protect the volume when accessed across the network Only really feasible in very small workgroup scenarios, rarely applies to SharePoint (c) 2011 Microsoft. All rights reserved.
  • 10. Active Directory Rights Management Services (AD RMS) Encrypts content upon access and removal, not in storage Provides Rights Protection, which can expire a document or limit the ability to: Print Cut/Paste Programmatically access Save As a different file Can be used with TDE (c) 2011 Microsoft. All rights reserved.
  • 11. SQL Transparent Data Encryption (TDE) New in SQL Server 2008 Only Available with the Enterprise Edition Seamless Encryption of Individual Databases Transparent to Applications, including SharePoint (c) 2011 Microsoft. All rights reserved.
  • 12. SQL Transparent Data Encryption (TDE) When enabled, encrypts Database, log file, any info written to TempDB, snapshots, backups, and Mirrored DB instance, if applicable Operates at the I/O level through the buffer pool, so any data written into the MDF is encrypted Can be selectively enabled on specific databases Backups cannot be restored to other servers without a copy of the private key, stolen MDF files are worthless to the thief Easier Administration, Minimal server resources required (3%-5% performance hit) (c) 2011 Microsoft. All rights reserved.
  • 13. Potential TDE Limitations Does not encrypt the Communication Channel (IPSec can be added) Does not protect data in memory (DBAs could access) Cannot take advantage of SQL 2008 Backup Compression TempDB is encrypted for the entire instance, even if only one DB is enabled for TDE, which can have a peprformance effect for other DBs Replication or FILESTREAM data is not encrypted when TDE is enabled (i.e. RBS BLOBs not encrypted) (c) 2011 Microsoft. All rights reserved.
  • 14. How TDE Works Windows Data Protection API (DPAPI) at root of encryption key hierarchy DPAPI creates and protects Service Master Key (SMK) during SQL Setup SMK used to protect Database Master Key (DMK) DMK used to protect Certificate and Asymmetric Key Certificate and Asymmetric Key used to create Database Encryption Key (DEK) (c) 2011 Microsoft. All rights reserved.
  • 15. (c) 2011 Microsoft. All rights reserved. Key and Cert Hierarchy DPAPI Encrypts SMK SMK encrypts the DMK for master DB Service Master Key Data Protection API (DPAPI) Database Master Key Certificate Database Encryption Key SQL Instance Level Windows OS Level master DB Level master DB Level Content DB Level DMK creates Cert in master DB Certificate Encrypts DEK in Content DB DEK used to encrypt Content DB
  • 16. High Level Steps to Enable TDE Create the DMK Create the TDE Cert Backup the TDE Cert Create the DEK Encrypt the DB Monitor Progress (c) 2011 Microsoft. All rights reserved.
  • 17. Creating the Database Master Key (DMK) Symmetric key used to protect private keys and asymmetric keys Protected itself by Service Master Key (SMK), which is created by SQL Server setup Use syntax as follows: USE master; GO CREATE MASTER KEY ENCRYPTION BY PASSWORD = 'CrypticTDEpw4CompanyABC'; GO (c) 2011 Microsoft. All rights reserved.
  • 18. Create Certificate Protected by DMK Protected by the DMK Used to protect the database encryption key Use syntax as follows: USE master; GO CREATE CERTIFICATE CompanyABCtdeCert WITH SUBJECT = 'CompanyABC TDE Certificate' ; GO (c) 2011 Microsoft. All rights reserved.
  • 19. Backup Master Key and Cert Without a backup, data can be lost Backup creates two files, the Cert backup and the Private Key File Use following syntax: USE master; GO BACKUP CERTIFICATE CompanyABCtdeCert TO FILE = 'c:ackupompanyABCtdeCERT.cer' WITH PRIVATE KEY ( FILE = 'c:ackupompanyABCtdeDECert.pvk', ENCRYPTION BY PASSWORD = 'CrypticTDEpw4CompanyABC!' ); GO (c) 2011 Microsoft. All rights reserved.
  • 20. Create a Database Encryption Key (DEK) DEK is used to encrypt specific database One created for each database Encryption method can be chosen for each DEK Use following syntax: USE SharePointContentDB; GO CREATE DATABASE ENCRYPTION KEY WITH ALGORITHM = AES_256 ENCRYPTION BY SERVER CERTIFICATE CompanyABCtdeCert GO (c) 2011 Microsoft. All rights reserved.
  • 21. Enable TDE Data encryption will begin after running command Size of DB will determine time it will take, can be lengthy and could cause user blocking Use following syntax: USE SharePointContentDB GO ALTER DATABASE SharePointContentDB SET ENCRYPTION ON GO (c) 2011 Microsoft. All rights reserved.
  • 22. Monitor TDE Progress State is Returned State of 2 = Encryption Begun State of 3 = Encryption Complete Use following syntax: USE SharePointContentDB GO SELECT * FROM sys.dm_database_encryption_keys WHERE encryption_state = 3; GO (c) 2011 Microsoft. All rights reserved.
  • 23. Restoring Encrypted DB to Another Server Step 1: Create new Master Key on Target Server (Does not need to match source master key) Step 2: Backup Cert and Private Key from Source Step 3: Restore Cert and Private Key onto Target (No need to export the DEK as it is part of the backup) USE master; GO CREATE CERTIFICATE CompanyABCtdeCert FROM FILE = 'C:estoreompanyABCtdeCert.cer' WITH PRIVATE KEY ( FILE = 'C:estoreompanyABCtdeCert.pvk' , DECRYPTION BY PASSWORD = 'CrypticTDEpw4CompanyABC!' ) Step 4: Restore DB (c) 2011 Microsoft. All rights reserved.
  • 24. Demo Encrypting SharePoint Content DBs using Transparent Data Encryption
  • 25. Complete an Evaluation online and enter to WIN these prizes! <Prizes & Process TBC> (c) 2011 Microsoft. All rights reserved.
  • 26. Thanks for attending!Questions? Michael Noel Twitter: @MichaelTNoel www.cco.com Slides: slideshare.net/michaeltnoel
  • 27. © 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. (c) 2011 Microsoft. All rights reserved.
  • 28. www.msteched.com/Australia Sessions On-Demand & Community www.microsoft.com/australia/learning Microsoft Certification & Training Resources http:// technet.microsoft.com/en-au Resources for IT Professionals http://msdn.microsoft.com/en-au Resources for Developers Resources (c) 2011 Microsoft. All rights reserved.