We help IT Professionals succeed at work.

Best Practise to store Database Master Key

I have two questions here :
1)  I wanted to know wht are the best practices for storing the Database Master Key that is used for encrypting the database.  The vendor suggested us to store the password for database masterkey on a piece of paper and keep the paper at a secure location, which I didnt agree with?  Just taking a backup of the key on a flash drive is betteR? How would you argue the hard copy is bad?

2) Application connecting to back end sql server access encrypted data, where should the encryption keys be stored as a best practice...definitely not coded in the application that is wrong. One solution I thought was to store it in the registry of sql server, which gets decrypted when the application with appropriate user credentials connects to the sql server . any suggestion are welcome
Comment
Watch Question

Top Expert 2007
Commented:
I would say paper is fine if you have nothing of importance in the database. Otherwise, fire, spilled liquids and accidental destruction can leave you without it.

I think your idea of storing it in the registry is fine, providing an electronic copy is made and stored at the same location as your backups. Then if someone needs to change the password, it will be saved with the next backup. In the event your server is destroyed, you will be able to recreate your database and add the registry key as a part of the same process. That also protects you from someone who might gain access to the server and accidentally or maliciously use Regedit to alter or destroy the value in that key.

Jim
Commented:
1) Hardcopy is good. It a) con not be accessed electronically b) have a better chances to survive disaster (ask archeologists ;). Just don't consider your place secure, use bank vault. If the information is really important, think about split-knowledge technique and using two or more separated safes with restricted access to them.

2) The security is always goes with cost. If you think that chances of insider attack are low, your way is fine. You might need better technique for CSP zeroization.

However, if your information is very valuable, think about hardware solution like TPM
http://en.wikipedia.org/wiki/Trusted_Platform_Module

Explore More ContentExplore courses, solutions, and other research materials related to this topic.