SlideShare a Scribd company logo
Protecting Your SharePoint Content Databases using SQL Transparent Data Encryption
Protecting your SharePoint Content with SQL Server 2008 Transparent Database EncryptionMichael NoelPartnerConvergent ComputingSESSION CODE: #AIT008(c) 2011 Microsoft. All rights reserved.
Michael NoelSydneyBrisbaneCanberraTasmaniaKatoombaSkippyHungryQuokkasBondiMelbourne12 (11)ApostlesAdelaidePerthGreat to be back in Beautiful Australia!
Session OverviewDiscussion of various Encryption OptionsCell-level EncryptionFile-Level Encryption (Bitlocker, EFS)Transparent Data EncryptionActive Directory Rights Management Services (AD RMS)TDE OverviewTDE for SharePoint Content DatabasesDemo of TDE(c) 2011 Microsoft. All rights reserved.
The problem? Unencrypted DataData Stored Unencrypted on a SQL ServerStolen Backups or Administrators of a Server can have access to all SharePoint ContentGovernmental and Industry Regulation Restricts Storage of Content Unencrypted(c) 2011 Microsoft. All rights reserved.
The Solution? Data EncryptionMany Options, same conceptFiles are stored in unreadable format, using PKI based encryptionSome Options require Application Support (i.e. Cell-level Encryption), which SharePoint doesn't support(c) 2011 Microsoft. All rights reserved.
Cell Level EncryptionAvailable with either SQL 2005 or SQL 2008Encrypts individual cells in a databaseRequires a password to access the cellRequires that columns be changed from their original data type to varbinaryAdvantage is that only specific info is encryptedDisadvantage is that you cannot use this for SharePoint Databases(c) 2011 Microsoft. All rights reserved.
File-level EncryptionTwo forms, older Encrypting File System (EFS) and BitlockerEFS encrypts data at the File LevelBitlocker encrypts data at the Volume LevelBitlocker Encrypts every file on the disk, not just database filesCould be used together with TDE(c) 2011 Microsoft. All rights reserved.
File-level EncryptionBiggest drawback: Heavy Performance HitNo support for prefetch or asynchrouous I/OI/O operations can become bottlenecked and serializedDoesn't protect the volume when accessed across the networkOnly really feasible in very small workgroup scenarios, rarely applies to SharePoint(c) 2011 Microsoft. All rights reserved.
Active Directory Rights Management Services (AD RMS)Encrypts content upon access and removal, not in storageProvides Rights Protection, which can expire a document or limit the ability to:PrintCut/PasteProgrammatically accessSave As a different fileCan be used with TDE(c) 2011 Microsoft. All rights reserved.
SQL Transparent Data Encryption (TDE)New in SQL Server 2008Only Available with the Enterprise EditionSeamless Encryption of Individual DatabasesTransparent to Applications, including SharePoint(c) 2011 Microsoft. All rights reserved.
SQL Transparent Data Encryption (TDE)When enabled, encrypts Database, log file, any info written to TempDB, snapshots, backups, and Mirrored DB instance, if applicableOperates at the I/O level through the buffer pool, so any data written into the MDF is encryptedCan be selectively enabled on specific databasesBackups cannot be restored to other servers without a copy of the private key, stolen MDF files are worthless to the thiefEasier Administration, Minimal server resources required (3%-5% performance hit)(c) 2011 Microsoft. All rights reserved.
Potential TDE Limitations	Does not encrypt the Communication Channel (IPSec can be added)Does not protect data in memory (DBAs could access)Cannot take advantage of SQL 2008 Backup CompressionTempDB is encrypted for the entire instance, even if only one DB is enabled for TDE, which can have a peprformance effect for other DBsReplication or FILESTREAM data is not encrypted when TDE is enabled (i.e. RBS BLOBs not encrypted)(c) 2011 Microsoft. All rights reserved.
How TDE WorksWindows Data Protection API (DPAPI) at root of encryption key hierarchyDPAPI creates and protects Service Master Key (SMK) during SQL SetupSMK used to protect Database Master Key (DMK)DMK used to protect Certificate and Asymmetric KeyCertificate and Asymmetric Key used to create Database Encryption Key (DEK)(c) 2011 Microsoft. All rights reserved.
(c) 2011 Microsoft. All rights reserved.Key and Cert HierarchyDPAPI Encrypts SMKSMK encrypts the DMK for master DB         Service Master Key                      Data Protection API (DPAPI)            Database Master KeyCertificate                   Database Encryption KeySQL Instance LevelWindows OS Levelmaster DB Levelmaster DB LevelContent DB LevelDMK creates Cert in master DBCertificate Encrypts DEK in Content DBDEK used to encrypt Content DB
High Level Steps to Enable TDECreate the DMKCreate the TDE CertBackup the TDE CertCreate the DEKEncrypt the DBMonitor Progress(c) 2011 Microsoft. All rights reserved.
Creating the Database Master Key (DMK)Symmetric key used to protect private keys and asymmetric keysProtected itself by Service Master Key (SMK), which is created by SQL Server setupUse syntax as follows:USE master;GOCREATE MASTER KEY ENCRYPTION BY PASSWORD = 'CrypticTDEpw4CompanyABC';GO(c) 2011 Microsoft. All rights reserved.
Create Certificate Protected by DMKProtected by the DMKUsed to protect the database encryption keyUse syntax as follows:USE master;GOCREATE CERTIFICATE CompanyABCtdeCert WITH SUBJECT = 'CompanyABC TDE Certificate' ;GO(c) 2011 Microsoft. All rights reserved.
Backup Master Key and CertWithout a backup, data can be lostBackup creates two files, the Cert backup and the Private Key FileUse following syntax:USE master;GOBACKUP CERTIFICATE CompanyABCtdeCert TO FILE = 'c:\Backup\CompanyABCtdeCERT.cer' WITH PRIVATE KEY ( FILE = 'c:\Backup\CompanyABCtdeDECert.pvk', ENCRYPTION BY PASSWORD = 'CrypticTDEpw4CompanyABC!' );GO(c) 2011 Microsoft. All rights reserved.
Create a Database Encryption Key (DEK)DEK is used to encrypt specific databaseOne created for each databaseEncryption method can be chosen for each DEKUse following syntax:USE SharePointContentDB;GOCREATE DATABASE ENCRYPTION KEY WITH ALGORITHM = AES_256 ENCRYPTION BY SERVER CERTIFICATE CompanyABCtdeCertGO(c) 2011 Microsoft. All rights reserved.
Enable TDEData encryption will begin after running commandSize of DB will determine time it will take, can be lengthy and could cause user blockingUse following syntax:USE SharePointContentDBGOALTER DATABASE SharePointContentDBSET ENCRYPTION ONGO(c) 2011 Microsoft. All rights reserved.
Monitor TDE ProgressState is ReturnedState of 2 = Encryption BegunState of 3 = Encryption CompleteUse following syntax:USE SharePointContentDBGOSELECT *FROM sys.dm_database_encryption_keysWHERE encryption_state = 3;GO(c) 2011 Microsoft. All rights reserved.
Restoring Encrypted DB to Another ServerStep 1: Create new Master Key on Target Server (Does not need to match source master key)Step 2: Backup Cert and Private Key from SourceStep 3: Restore Cert and Private Key onto Target (No need to export the DEK as it is part of the backup)USE master;GOCREATE CERTIFICATE CompanyABCtdeCertFROM FILE = 'C:\Restore\CompanyABCtdeCert.cer'WITH PRIVATE KEY (FILE = 'C:\Restore\CompanyABCtdeCert.pvk', DECRYPTION BY PASSWORD = 'CrypticTDEpw4CompanyABC!')Step 4: Restore DB(c) 2011 Microsoft. All rights reserved.
DemoEncrypting SharePoint Content DBs using Transparent Data Encryption
Complete an Evaluation online and enter to WIN these prizes!<Prizes & Process TBC>(c) 2011 Microsoft. All rights reserved.
Thanks for attending!Questions?Michael NoelTwitter: @MichaelTNoelwww.cco.comSlides: slideshare.net/michaeltnoel
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation.  Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.  MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.(c) 2011 Microsoft. All rights reserved.
www.msteched.com/AustraliaSessions On-Demand & Communitywww.microsoft.com/australia/learningMicrosoft Certification & Training Resourceshttp:// technet.microsoft.com/en-auResources for IT Professionalshttp://msdn.microsoft.com/en-auResources for DevelopersResources(c) 2011 Microsoft. All rights reserved.

More Related Content

PPTX
Transparent Data Encryption for SharePoint Content Databases
PPTX
Docker Container Security
PPTX
Presentation linux on power
PDF
Scaling up and accelerating Drupal 8 with NoSQL
PPTX
Containerization and Docker
PDF
Data Domain Architecture
PDF
Introducción a Kubernetes
PPTX
Improving Clinical Trial Performance: Part 3 - Streamline Trial Management wi...
Transparent Data Encryption for SharePoint Content Databases
Docker Container Security
Presentation linux on power
Scaling up and accelerating Drupal 8 with NoSQL
Containerization and Docker
Data Domain Architecture
Introducción a Kubernetes
Improving Clinical Trial Performance: Part 3 - Streamline Trial Management wi...

What's hot (20)

ODP
¿Qué es docker?
PDF
2021.02 new in Ceph Pacific Dashboard
PPTX
Transparent Data Encryption
PDF
Part 3 Maximizing the utilization of GPU resources on-premise and in the cloud
PDF
AV/DF Advanced Security Option
PDF
Kubernetes
DOCX
Data guard architecture
PPTX
Introducing Oracle Audit Vault and Database Firewall
PDF
Kubernetes Security Best Practices - With tips for the CKS exam
PDF
Alphorm.com Formation Microsoft Azure (AZ-500) : Sécurité
PDF
Cluster-as-code. The Many Ways towards Kubernetes
PPTX
Scaling Solr with Solr Cloud
PDF
Kubernetes 101
PPT
Active directory slides
PDF
Scaling DevSecOps Culture for Enterprise
PDF
Argocd up and running
PPTX
The Nextcloud Roadmap for Secure Team Collaboration
PDF
PDF
RACF - The Basics (v1.2)
PPT
IoR 2 Dec 10
¿Qué es docker?
2021.02 new in Ceph Pacific Dashboard
Transparent Data Encryption
Part 3 Maximizing the utilization of GPU resources on-premise and in the cloud
AV/DF Advanced Security Option
Kubernetes
Data guard architecture
Introducing Oracle Audit Vault and Database Firewall
Kubernetes Security Best Practices - With tips for the CKS exam
Alphorm.com Formation Microsoft Azure (AZ-500) : Sécurité
Cluster-as-code. The Many Ways towards Kubernetes
Scaling Solr with Solr Cloud
Kubernetes 101
Active directory slides
Scaling DevSecOps Culture for Enterprise
Argocd up and running
The Nextcloud Roadmap for Secure Team Collaboration
RACF - The Basics (v1.2)
IoR 2 Dec 10
Ad

Similar to Protecting Your SharePoint Content Databases using SQL Transparent Data Encryption (20)

PPTX
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
PPTX
SEASPC 2011 - SharePoint Security in an Insecure World: Understanding the Fiv...
PPTX
SPTechCon SFO 2012 - Understanding the Five Layers of SharePoint Security
PPT
SQL Server 2008 Security Overview
PPTX
Security for SharePoint in an Insecure World - SharePoint Connections Amsterd...
PPTX
SharePoint Security in an Insecure World - AUSPC 2012
PPTX
PPTX
SQL Server - High availability
PPTX
AUSPC 2013 - Understanding the Five Layers of SharePoint Security
PDF
Getting Started with Sql Server Compact Edition
PDF
Getting Started with SQL Server Compact Edition 3.51
PPTX
Moving to the cloud azure, office365, and intune - concurrency
PDF
Sql Server 2008 Security Enhanments
PPTX
SQLCAT - Data and Admin Security
PPT
Ebook10
PPT
Sql interview question part 10
PPTX
SPS Belgium 2012 - End to End Security for SharePoint Farms - Michael Noel
PPTX
System Center 2012 Virtual Machine Manager
PDF
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
PPTX
Platform Deep Dive
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
SEASPC 2011 - SharePoint Security in an Insecure World: Understanding the Fiv...
SPTechCon SFO 2012 - Understanding the Five Layers of SharePoint Security
SQL Server 2008 Security Overview
Security for SharePoint in an Insecure World - SharePoint Connections Amsterd...
SharePoint Security in an Insecure World - AUSPC 2012
SQL Server - High availability
AUSPC 2013 - Understanding the Five Layers of SharePoint Security
Getting Started with Sql Server Compact Edition
Getting Started with SQL Server Compact Edition 3.51
Moving to the cloud azure, office365, and intune - concurrency
Sql Server 2008 Security Enhanments
SQLCAT - Data and Admin Security
Ebook10
Sql interview question part 10
SPS Belgium 2012 - End to End Security for SharePoint Farms - Michael Noel
System Center 2012 Virtual Machine Manager
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
Platform Deep Dive
Ad

More from Michael Noel (20)

PDF
AI is Hacking You - Digital Workplace Conference Australia 2024
PPTX
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
PPTX
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
PPTX
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
PPTX
IT Insecurity - ST Digital Brazzaville
PPTX
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
PPTX
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
PPTX
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
PPTX
Understanding the Tools and Features of Office 365 : DWT Africa 2018
PPTX
SPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
PPTX
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
PPTX
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
PPTX
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
PPTX
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
PPTX
Office 365; A Detailed Analysis - SPS Kampala 2017
PPTX
Office 365; une Analyse Détaillée
PPTX
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
PPTX
Breaking Down and Understanding Office 365 - SPSJHB 2015
PPTX
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
PPTX
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
AI is Hacking You - Digital Workplace Conference Australia 2024
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
IT Insecurity - ST Digital Brazzaville
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Understanding the Tools and Features of Office 365 : DWT Africa 2018
SPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; une Analyse Détaillée
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
Breaking Down and Understanding Office 365 - SPSJHB 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Big Data Technologies - Introduction.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Spectral efficient network and resource selection model in 5G networks
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Reach Out and Touch Someone: Haptics and Empathic Computing
Big Data Technologies - Introduction.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Assigned Numbers - 2025 - Bluetooth® Document
Network Security Unit 5.pdf for BCA BBA.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
A Presentation on Artificial Intelligence
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Approach and Philosophy of On baking technology
Encapsulation_ Review paper, used for researhc scholars
sap open course for s4hana steps from ECC to s4
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
MYSQL Presentation for SQL database connectivity
Review of recent advances in non-invasive hemoglobin estimation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The AUB Centre for AI in Media Proposal.docx
A comparative analysis of optical character recognition models for extracting...
Per capita expenditure prediction using model stacking based on satellite ima...
Spectral efficient network and resource selection model in 5G networks

Protecting Your SharePoint Content Databases using SQL Transparent Data Encryption

  • 2. Protecting your SharePoint Content with SQL Server 2008 Transparent Database EncryptionMichael NoelPartnerConvergent ComputingSESSION CODE: #AIT008(c) 2011 Microsoft. All rights reserved.
  • 4. Session OverviewDiscussion of various Encryption OptionsCell-level EncryptionFile-Level Encryption (Bitlocker, EFS)Transparent Data EncryptionActive Directory Rights Management Services (AD RMS)TDE OverviewTDE for SharePoint Content DatabasesDemo of TDE(c) 2011 Microsoft. All rights reserved.
  • 5. The problem? Unencrypted DataData Stored Unencrypted on a SQL ServerStolen Backups or Administrators of a Server can have access to all SharePoint ContentGovernmental and Industry Regulation Restricts Storage of Content Unencrypted(c) 2011 Microsoft. All rights reserved.
  • 6. The Solution? Data EncryptionMany Options, same conceptFiles are stored in unreadable format, using PKI based encryptionSome Options require Application Support (i.e. Cell-level Encryption), which SharePoint doesn't support(c) 2011 Microsoft. All rights reserved.
  • 7. Cell Level EncryptionAvailable with either SQL 2005 or SQL 2008Encrypts individual cells in a databaseRequires a password to access the cellRequires that columns be changed from their original data type to varbinaryAdvantage is that only specific info is encryptedDisadvantage is that you cannot use this for SharePoint Databases(c) 2011 Microsoft. All rights reserved.
  • 8. File-level EncryptionTwo forms, older Encrypting File System (EFS) and BitlockerEFS encrypts data at the File LevelBitlocker encrypts data at the Volume LevelBitlocker Encrypts every file on the disk, not just database filesCould be used together with TDE(c) 2011 Microsoft. All rights reserved.
  • 9. File-level EncryptionBiggest drawback: Heavy Performance HitNo support for prefetch or asynchrouous I/OI/O operations can become bottlenecked and serializedDoesn't protect the volume when accessed across the networkOnly really feasible in very small workgroup scenarios, rarely applies to SharePoint(c) 2011 Microsoft. All rights reserved.
  • 10. Active Directory Rights Management Services (AD RMS)Encrypts content upon access and removal, not in storageProvides Rights Protection, which can expire a document or limit the ability to:PrintCut/PasteProgrammatically accessSave As a different fileCan be used with TDE(c) 2011 Microsoft. All rights reserved.
  • 11. SQL Transparent Data Encryption (TDE)New in SQL Server 2008Only Available with the Enterprise EditionSeamless Encryption of Individual DatabasesTransparent to Applications, including SharePoint(c) 2011 Microsoft. All rights reserved.
  • 12. SQL Transparent Data Encryption (TDE)When enabled, encrypts Database, log file, any info written to TempDB, snapshots, backups, and Mirrored DB instance, if applicableOperates at the I/O level through the buffer pool, so any data written into the MDF is encryptedCan be selectively enabled on specific databasesBackups cannot be restored to other servers without a copy of the private key, stolen MDF files are worthless to the thiefEasier Administration, Minimal server resources required (3%-5% performance hit)(c) 2011 Microsoft. All rights reserved.
  • 13. Potential TDE Limitations Does not encrypt the Communication Channel (IPSec can be added)Does not protect data in memory (DBAs could access)Cannot take advantage of SQL 2008 Backup CompressionTempDB is encrypted for the entire instance, even if only one DB is enabled for TDE, which can have a peprformance effect for other DBsReplication or FILESTREAM data is not encrypted when TDE is enabled (i.e. RBS BLOBs not encrypted)(c) 2011 Microsoft. All rights reserved.
  • 14. How TDE WorksWindows Data Protection API (DPAPI) at root of encryption key hierarchyDPAPI creates and protects Service Master Key (SMK) during SQL SetupSMK used to protect Database Master Key (DMK)DMK used to protect Certificate and Asymmetric KeyCertificate and Asymmetric Key used to create Database Encryption Key (DEK)(c) 2011 Microsoft. All rights reserved.
  • 15. (c) 2011 Microsoft. All rights reserved.Key and Cert HierarchyDPAPI Encrypts SMKSMK encrypts the DMK for master DB Service Master Key Data Protection API (DPAPI) Database Master KeyCertificate Database Encryption KeySQL Instance LevelWindows OS Levelmaster DB Levelmaster DB LevelContent DB LevelDMK creates Cert in master DBCertificate Encrypts DEK in Content DBDEK used to encrypt Content DB
  • 16. High Level Steps to Enable TDECreate the DMKCreate the TDE CertBackup the TDE CertCreate the DEKEncrypt the DBMonitor Progress(c) 2011 Microsoft. All rights reserved.
  • 17. Creating the Database Master Key (DMK)Symmetric key used to protect private keys and asymmetric keysProtected itself by Service Master Key (SMK), which is created by SQL Server setupUse syntax as follows:USE master;GOCREATE MASTER KEY ENCRYPTION BY PASSWORD = 'CrypticTDEpw4CompanyABC';GO(c) 2011 Microsoft. All rights reserved.
  • 18. Create Certificate Protected by DMKProtected by the DMKUsed to protect the database encryption keyUse syntax as follows:USE master;GOCREATE CERTIFICATE CompanyABCtdeCert WITH SUBJECT = 'CompanyABC TDE Certificate' ;GO(c) 2011 Microsoft. All rights reserved.
  • 19. Backup Master Key and CertWithout a backup, data can be lostBackup creates two files, the Cert backup and the Private Key FileUse following syntax:USE master;GOBACKUP CERTIFICATE CompanyABCtdeCert TO FILE = 'c:\Backup\CompanyABCtdeCERT.cer' WITH PRIVATE KEY ( FILE = 'c:\Backup\CompanyABCtdeDECert.pvk', ENCRYPTION BY PASSWORD = 'CrypticTDEpw4CompanyABC!' );GO(c) 2011 Microsoft. All rights reserved.
  • 20. Create a Database Encryption Key (DEK)DEK is used to encrypt specific databaseOne created for each databaseEncryption method can be chosen for each DEKUse following syntax:USE SharePointContentDB;GOCREATE DATABASE ENCRYPTION KEY WITH ALGORITHM = AES_256 ENCRYPTION BY SERVER CERTIFICATE CompanyABCtdeCertGO(c) 2011 Microsoft. All rights reserved.
  • 21. Enable TDEData encryption will begin after running commandSize of DB will determine time it will take, can be lengthy and could cause user blockingUse following syntax:USE SharePointContentDBGOALTER DATABASE SharePointContentDBSET ENCRYPTION ONGO(c) 2011 Microsoft. All rights reserved.
  • 22. Monitor TDE ProgressState is ReturnedState of 2 = Encryption BegunState of 3 = Encryption CompleteUse following syntax:USE SharePointContentDBGOSELECT *FROM sys.dm_database_encryption_keysWHERE encryption_state = 3;GO(c) 2011 Microsoft. All rights reserved.
  • 23. Restoring Encrypted DB to Another ServerStep 1: Create new Master Key on Target Server (Does not need to match source master key)Step 2: Backup Cert and Private Key from SourceStep 3: Restore Cert and Private Key onto Target (No need to export the DEK as it is part of the backup)USE master;GOCREATE CERTIFICATE CompanyABCtdeCertFROM FILE = 'C:\Restore\CompanyABCtdeCert.cer'WITH PRIVATE KEY (FILE = 'C:\Restore\CompanyABCtdeCert.pvk', DECRYPTION BY PASSWORD = 'CrypticTDEpw4CompanyABC!')Step 4: Restore DB(c) 2011 Microsoft. All rights reserved.
  • 24. DemoEncrypting SharePoint Content DBs using Transparent Data Encryption
  • 25. Complete an Evaluation online and enter to WIN these prizes!<Prizes & Process TBC>(c) 2011 Microsoft. All rights reserved.
  • 26. Thanks for attending!Questions?Michael NoelTwitter: @MichaelTNoelwww.cco.comSlides: slideshare.net/michaeltnoel
  • 27. © 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.(c) 2011 Microsoft. All rights reserved.
  • 28. www.msteched.com/AustraliaSessions On-Demand & Communitywww.microsoft.com/australia/learningMicrosoft Certification & Training Resourceshttp:// technet.microsoft.com/en-auResources for IT Professionalshttp://msdn.microsoft.com/en-auResources for DevelopersResources(c) 2011 Microsoft. All rights reserved.