Solved

MS-SQL 2008 Standard - define the security for internal data

Posted on 2016-11-09
4
67 Views
Last Modified: 2016-11-15
Hi database gurus,

I'm looking for a technology for securing data inside a database. Is there is any way there we can secure data by protective marking ?
Any help tips guidance and references are highly appreciated.

I have found it can be done using SQL views and Custom app code. But there would be some disadvantages, further found there will be a security featured implemented in SQL 2016 called "Raw Level Security" but in my case I have MS-SQL 2008 Standard.

Please shed some lights on the situation.

Thanks in advance !
0
Comment
Question by:Shakthi777
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 28

Accepted Solution

by:
Pawan Kumar earned 500 total points
ID: 41881599
I think you should try out the column level security for data for Transparent Data Encryption ( TDE ) for data files and backups.

https://www.mssqltips.com/sqlservertip/2431/sql-server-column-level-encryption-example-using-symmetric-keys/

https://msdn.microsoft.com/en-us/library/bb934049.aspx

Hope it helps !!
0
 
LVL 49

Expert Comment

by:Vitor Montalvão
ID: 41881779
What kind of security do you want?
Filter the data by user type (like, each user can only see his own data or maybe some few data more)?
Protect the data from hackers?
Other?
0
 

Author Comment

by:Shakthi777
ID: 41881785
The database contents must be with protective marking.
0
 
LVL 49

Expert Comment

by:Vitor Montalvão
ID: 41881820
So any user that access to the database can view all the data and what you need is to protect the database from non-authorized users, right?
Then best protection is always keep the server in a exclusive room and set the right permissions on the AD for only authorized users can access remotely the machine. Plus the necessary firewalls and then you can think in encrypting the database and also the backups.
This will make the hackers life harder.
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
Do you know what to look for when considering cloud computing? Should you hire someone or try to do it yourself? I'll be covering these questions and looking at the best options for you and your business.
Via a live example, show how to setup several different housekeeping processes for a SQL Server.
Viewers will learn how to use the SELECT statement in SQL and will be exposed to the many uses the SELECT statement has.

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question