Overview
Explore the critical topic of data protection through encryption in SQL Server in this 56-minute PASS Data Community Summit presentation. Learn about four key encryption methods: hashes, cell-level encryption, transparent data encryption, and backup encryption. Discover the importance of encryption in today's cybersecurity landscape, understand the different types of keys required, and gain insights on protecting the encryption keys themselves. Delve into topics such as symmetric keys, certificates, database master keys, service master keys, and extensible key management. Address common concerns about implementation difficulty and explore limitations of transparent data encryption. Gain practical knowledge to enhance your organization's data security and mitigate risks associated with potential data breaches.
Syllabus
Intro
Technical Assistance
PASS SUMMIT 2015
Speaker Bio
Why should we use encryption?
Your Goals
This sounds hard...
Hashes
Symmetric Keys
Certificates
Database Master Key
Service Master Key
Backup Encryption
Transparent Data Encryption (TDE)
Limitations of TDE
In-Transit Encryption
Protect Your Keys!
Protecting Your Keys
Extensible Key Management (EKM)
Review
Taught by
PASS Data Community Summit