Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
15 views

Database Backup Encryption in SQL Server

Database Backup Encryption in SQL Server

Uploaded by

Rofiq Ahmed
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Database Backup Encryption in SQL Server

Database Backup Encryption in SQL Server

Uploaded by

Rofiq Ahmed
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Database Backup Encryption in

SQL Server
In this training
• Key challenges in securing data
• What database encryption is?
• Types of Encryption
• Hands-on training
Database Backup with Encryption
Almost every organization has a challenge of protecting the data. It is almost
impossible to run a business without protecting the sensitive data. This feature
comes handy where backups are managed and handled at a remote site or
cloud. In order to encrypt the backup, we will need a certificate. And, in order to
create a certificate, we will need a master key for the database.
What database encryption is?
• Encryption is the process of converting human-readable data (plaintext)
into unintelligible cipher text. This scrambling of data is the result of an
algorithmic operation that uses a cryptographic key. Simply put, encryption
takes your data and makes it random enough so that anybody who steals it
can’t read it unless they have the key to turn it back into a legible form.

• Starting in SQL Server 2014 (12.x), SQL Server has the ability to encrypt the
data while creating a backup. By specifying the encryption algorithm and
the encryptor (a Certificate or Asymmetric Key) when creating a backup,
you can create an encrypted backup file.
What database encryption is? (Continue)
• Encryption Algorithm: The supported encryption algorithms are: AES 128,
AES 192, AES 256, and Triple DES

• Encryptor: A certificate or asymmetric Key

• The database master key is a symmetric key that is used to protect the
private keys of certificates and asymmetric keys that are present in the
database.

• Certificates can be encrypted using either a password or a DMK.


Types of Encryption

• The use of encryption is necessary if we want privacy and for protecting our
data at rest, in use, or in motion.

• There are two main types —


• Symmetric encryption
• Asymmetric encryption
Symmetric Encryption
In the case of symmetric encryption, the same key is used for both encrypting and
decrypting messages. Because the entire mechanism is dependent on keeping the
key a shared secret — meaning that it needs to be shared with the recipient in a
secure way so that only they can use it to decrypt the message

The length of the keys


used is typically
128 or 256 bits, based
on the security requirement.
Asymmetric Encryption
Asymmetric encryption uses a pair of related keys — a public and a private key.
The public key, which is accessible to everyone, is what’s used to encrypt a
plaintext message before sending it. To decrypt and read this message, you need
to hold the private key. The public and the private keys are mathematically related,
but the private key cannot be derived from it.

The length of the keys is much


larger, e.g., the recommended
RSA key size is 2048 bits
or higher.
Hands-on
Thank You

You might also like