Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
!   "
            #    $ %   &        '            ! %& "

            ()



6/27/2009                  SoCal Code Camp   ...
6/27/2009   SoCal Code Camp   3
•                    '

                       •      *
                                        +
                        ...
•      )

                                   $
                       •                   $        .
                     ...
6/27/2009   SoCal Code Camp   6
1              $
                                  . '

                                  $2
                             ...
•               $


                       •

                              –
                              – )
          ...
6
                 0 % !"
                 0 % !"
                          %
       )
            /                      ...
6/27/2009   SoCal Code Camp   10
•     1
       – 1 )7   67      6 67               / )
                                           :/    ;
                ...
•     4 $                           '
       –
       –         '                   $              .
       –    %        ...
•                                                   9
 •
       –    64 7 & )   %                     4 / 0
              ...
/                                  BC
                                           CD
       *    &                 '       ...
.     /
                                        36
                              0              '
                        ...
06 +
                        E $ '
       !   ;33$ '           3    3"
       F 0        E $ '
         ;
         33$ '  ...
6/27/2009   SoCal Code Camp   17
SQL Server Data Encryption and Security Compliance
Upcoming SlideShare
Loading in …5
×

SQL Server Data Encryption and Security Compliance

2,722 views

Published on

You have sensitive data to encrypt, how are you going to implement that? Encrypt at application level or database level? What kind of encryption algorithm and key should you use? How to manage your encryption keys? And, very importantly, will your implementation fly from an auditor’s point of view? This session will review the basics of SQL Server encryption concepts, and then walk you through the design of a real world example of large database encryption with SQL Server 2005 encryption that passed PCI DSS audit.

Published in: Technology
  • Be the first to comment

SQL Server Data Encryption and Security Compliance

  1. 1. ! " # $ % & ' ! %& " () 6/27/2009 SoCal Code Camp 2
  2. 2. 6/27/2009 SoCal Code Camp 3
  3. 3. • ' • * + + $ • , • ' - • $ $ 6/27/2009 SoCal Code Camp 4
  4. 4. • ) $ • $ . • / $ $ • . ) &) % • $ $ ' • 0 + + 6/27/2009 SoCal Code Camp 5
  5. 5. 6/27/2009 SoCal Code Camp 6
  6. 6. 1 $ . ' $2 3# % 6/27/2009 SoCal Code Camp 7
  7. 7. • $ • – – ) – 4 • % – % 5 6* – ) 16 / & – / 7 / 58) * 6/27/2009 SoCal Code Camp 8
  8. 8. 6 0 % !" 0 % !" % ) / 0 4 4 !" + 9 $ &% 6/27/2009 SoCal Code Camp 9
  9. 9. 6/27/2009 SoCal Code Camp 10
  10. 10. • 1 – 1 )7 67 6 67 / ) :/ ; ; 5 <# # ##= – 1 )7 ; ; <# # ##= • • , > ' • ' $ + $ $ • ' ; & 7 6/27/2009 SoCal Code Camp 11
  11. 11. • 4 $ ' – – ' $ . – % ' • – ! 5 5 "? – * $ ! &% & %+ &% + " – ) &) % 1 7 ) ,/ 7 4 / 0 4) , 6 67 @< = – 7 $ . – ' 6/27/2009 SoCal Code Camp 12
  12. 12. • 9 • – 64 7 & ) % 4 / 0 67 4) , 6 @# # ## – ) &) % ) 7 4 / 0 67 8/ & ) % • ' ' - • + + A 6/27/2009 SoCal Code Camp 13
  13. 13. / BC CD * & ' )4/!& )4/ " & ! &" $ BC CD $ ' ; ' 6/27/2009 SoCal Code Camp 14
  14. 14. . / 36 0 ' ; 3 ' ' # ' ' 4* / # 6/27/2009 SoCal Code Camp 15
  15. 15. 06 + E $ ' ! ;33$ ' 3 3" F 0 E $ ' ; 33$ ' 32 $ 3 3B C CG 3C 3C 3 J. H I .B C . CD # & 1 E ; 33 J 3 3 K KB C K.K CL 3M L 3 CD 6/27/2009 SoCal Code Camp 16
  16. 16. 6/27/2009 SoCal Code Camp 17

×