?
Solved

MS-SQL 2008 Standard - define the security for internal data

Posted on 2016-11-09
4
Medium Priority
?
98 Views
Last Modified: 2016-11-15
Hi database gurus,

I'm looking for a technology for securing data inside a database. Is there is any way there we can secure data by protective marking ?
Any help tips guidance and references are highly appreciated.

I have found it can be done using SQL views and Custom app code. But there would be some disadvantages, further found there will be a security featured implemented in SQL 2016 called "Raw Level Security" but in my case I have MS-SQL 2008 Standard.

Please shed some lights on the situation.

Thanks in advance !
0
Comment
Question by:Shakthi777
  • 2
4 Comments
 
LVL 38

Accepted Solution

by:
Pawan Kumar earned 2000 total points
ID: 41881599
I think you should try out the column level security for data for Transparent Data Encryption ( TDE ) for data files and backups.

https://www.mssqltips.com/sqlservertip/2431/sql-server-column-level-encryption-example-using-symmetric-keys/

https://msdn.microsoft.com/en-us/library/bb934049.aspx

Hope it helps !!
0
 
LVL 53

Expert Comment

by:Vitor Montalvão
ID: 41881779
What kind of security do you want?
Filter the data by user type (like, each user can only see his own data or maybe some few data more)?
Protect the data from hackers?
Other?
0
 

Author Comment

by:Shakthi777
ID: 41881785
The database contents must be with protective marking.
0
 
LVL 53

Expert Comment

by:Vitor Montalvão
ID: 41881820
So any user that access to the database can view all the data and what you need is to protect the database from non-authorized users, right?
Then best protection is always keep the server in a exclusive room and set the right permissions on the AD for only authorized users can access remotely the machine. Plus the necessary firewalls and then you can think in encrypting the database and also the backups.
This will make the hackers life harder.
0

Featured Post

Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It's not just another paperwork submission. Serious planning and rigour to managing the whole thought processes need to be put in place. The intent is not on drilling into the details, but to share tips in getting the first thing right to kick-start…
This blog will spread awareness about Dropbox. We have given the statements based upon our experience. Along with this, there is a section of some new plans that should be added in Dropbox this year. This will make the storage service enhanced from …
Viewers will learn how to use the UPDATE and DELETE statements to change or remove existing data from their tables. Make a table: Update a specific column given a specific row using the UPDATE statement: Remove a set of values using the DELETE s…
SQL Database Recovery Software repairs the MDF & NDF Files, corrupted due to hardware related issues or software related errors. Provides preview of recovered database objects and allows saving in either MSSQL, CSV, HTML or XLS format. Ensures recov…

599 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question