Solved

Encryption on database tables MSSQL 2008

Posted on 2014-12-02
3
51 Views
Last Modified: 2015-03-24
Hello experts,

DO you have any tutorial, suggestions  on how to encrypt tables on database MSSQL 2008?
Once they are encrypted, would it affect my ASP.net applications I have when i call such tables?


thank you
0
Comment
Question by:shpresa
  • 2
3 Comments
 
LVL 33

Expert Comment

by:Dave Howe
Comment Utility
Depends on how you want to encrypt.
If you are interested in at-rest encryption, then you can simply encrypt the storage media (bitlocker, efs, whatever)

If you want to do explicit encryption, then you need to alter apps to use the 2008 crypto primitives (such as ENCRYPTBYKEY - that means coding changes.

if you want to do this without altering the code, then you need to follow this guide to Transparent Data Encryption - might take a couple of looks before you get the idea, so feel free to post follow up questions in this thread for clarification :)
0
 

Author Comment

by:shpresa
Comment Utility
Hi thank you for the info.

I was interested for encryption at rest and in transit, when data is moving.
Without altering the code would be great. Is the transparent data encryption used when data is in transit?
0
 
LVL 33

Accepted Solution

by:
Dave Howe earned 500 total points
Comment Utility
TDE is similar to the on the fly disk encryption, but is done by the database engine rather than the operating system - think of it as on-the-fly table encryption.  

For that reason, it is effectively encrypted only "at rest" - the data from app to engine will be plaintext, so should be further protected by TLS at the session level between app and engine (the technology is the same as is used for https)

I did a little googling, and found This Article which may explain your options better.
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

Explore the encryption capabilities built into Google Apps and how these features can help you meet privacy policy and regulatory compliance, but are not a full solution. Understand and compare the most popular email encryption services for Google A…
As a financial services provider, your business is impacted by two of the strictest federal regulations on record: the Sarbanes-Oxley Act and the Gramm-Leach-Bliley Act. Correctly implementing faxing into your organization to provide secure, real-ti…
Via a live example, show how to backup a database, simulate a failure backup the tail of the database transaction log and perform the restore.
Viewers will learn how to use the SELECT statement in SQL to return specific rows and columns, with various degrees of sorting and limits in place.

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now