How to encrypt sql server database files and backups in sql server 2012 Standard edition on Amazon cloud

Posted on 2014-08-21
Last Modified: 2016-06-11

We have SQL Server 2012 Standard Edition On amazon EC2 Cloud.we would like secure our database files and backup files encrpyted.

Upon original research I thought I could use TDE but did not realize that it was only available for Enterprise or DataCenter versions of SQL Servers.

What is the most efficient and low cost method for data encryption? Should I do something through SQL Server or just use third party tools to encrypt the whole volume where DB and backups are? Also if someone can point to a way to use "Data encryption" that comes as feature in standard edition I would really appreciate. Every time I search for encryption on sql server I keep ending up on how to use TDE and in current scenario it is not feasible for the size of business to purchase Enterprise Edition.

Thanks in Advance.
Question by:ccfcfc
    LVL 39

    Accepted Solution

    One way to do that on Standard edition would be: "Through the strategic use of SQL Views and Triggers, you can automate encryption of sensitive data on your SQL Server without extensive program modifications, and still use a secure key management HSM to protect the encryption keys."
    LVL 4

    Assisted Solution

    by:Randy Knight, MCM
    If your requirement is to encrypt the data at rest, TDE is really your best option.  Encrypting data inside the database does not usually meet the requirements for encrypting at rest.  On standard edition, ther might be some 3rd party solutions that could work but I haven't worked with any of them.

    Author Comment

    Thanks for your responses.

    Can anyone list some third party tools which support encryption on sql server 2012 standard edition please.


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    Explore the encryption capabilities built into Google Apps and how these features can help you meet privacy policy and regulatory compliance, but are not a full solution. Understand and compare the most popular email encryption services for Google A…
    International Data Corporation (IDC) prognosticates that before the current the year gets over disbursing on IT framework products to be sent in cloud environs will be $37.1B.
    Via a live example, show how to shrink a transaction log file down to a reasonable size.
    Using examples as well as descriptions, and references to Books Online, show the documentation available for datatypes, explain the available data types and show how data can be passed into and out of variables.

    761 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    8 Experts available now in Live!

    Get 1:1 Help Now