* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download lesson15
Concurrency control wikipedia , lookup
Entity–attribute–value model wikipedia , lookup
Extensible Storage Engine wikipedia , lookup
Oracle Database wikipedia , lookup
Tandem Computers wikipedia , lookup
Microsoft Access wikipedia , lookup
Microsoft Jet Database Engine wikipedia , lookup
Team Foundation Server wikipedia , lookup
Database model wikipedia , lookup
Relational model wikipedia , lookup
Clusterpoint wikipedia , lookup
Additional Security Tools Lesson 15 Skills Matrix Guarding Your Data • Maintaining data integrity can also involve data encryption and auditing. Encryption • You can put another layer, encryption, on top of all this security. SQL Server encrypts data with hierarchical encryption and key management infrastructure. • Each layer encrypts the layer below it by using a combination of certificates, asymmetric keys, and symmetric keys, in scopes that parallel the permissions hierarchy SQL Server Encryption • To encrypt your connections to SQL Server, you first need to get a certificate. • You can get one from one of the major vendors such as VeriSign, or you can install Windows Certificate services and supply your own. • Once you have a certificate, you need to install it on the server. • Finally, you need to configure the clients to request encrypted connections to the server. SQL Server Encryption • The database-level cryptographic features in SQL Server rely on a database master key. • This key does not generate automatically when you create the database. – It must be created by the system administrator. • You need but one master key per database. Transparent Data Encryption • SQL Server 2008 includes a new feature known as Transparent Data Encryption (TDE). • This encryption is transparent to the application code as SQL Server 2008 automatically handles the encryption and decryption of all data going in to and out of the database. • The primary purpose of this TDE feature is to have the entire database encrypted so that any unauthorized person having direct access to copies of the database files and / or transaction log files cannot decrypt and read the data. Transparent Data Encryption • It is critically important to understand that the database master key and the encryption certificate need to be backed up to a secure location. • This location also needs to be separate from regular backups or other copies of the database files. • The encryption security provided by TDE is meaningless if database files and the certificate both fall into the hands of the wrong person. Extensible Key Management • SQL Server 2008 includes a new feature known as Extensible Key Management (EKM). • This is a method of providing for encryption methods using software and possibly hardware such as smart cards or USB devices provided by third-party entities. • With EKM, encryption can be established using physical hardware known as a Hardware Security Module (HSM). • This can be a more secure solution because the encryption keys do not reside with encrypted data in the database. • Instead, the keys are stored on the hardware device. Audits • Audits keep a record of database activities. Set configuration options for the factors of concern and then review the results. • If you suspect someone uses an employee’s login inappropriately, audit for logins and look for suspicious behaviors. C2 Criteria • In 1985, the Department of Defense published DOD Directive 5200.28-STD, Department of Defense Standard, “Department of Defense Trusted Computer System Evaluation Criteria” known familiarly as the “Orange Book” which was part of the “Rainbow Series” of security evaluation criteria. • The Orange Book laid out a matrix where A was the most trusted and D the least trusted. • Numbers were also used where 1 was the most stringent criteria. • The resultant classes, then, are A1, B1, B2, B3, C1, C2 and D. C2 Criteria • C2 requires controlled access protection and is deemed appropriate for “business sensitive” data—less guarded then confidential, secret or top secret classifications. • C2 requires individual accountability through login procedures, audit trails, object reuse and resource isolation. • SQL Server provides these protections Auditing • Auditing an instance of SQL Server or a SQL Server database involves tracking and logging events that occur on the system. • SQL Server Utility provides you a means to audit and manage your SQL Server environment as a whole through the concept of application and multiserver management. SQL Server Utility • SQL Server Utility provides you a means to audit and manage your SQL Server environment as a whole through the concept of application and multiserver management. • The SQL Server Utility models your organization’s SQL Server-related entities in a unified view. SQL Server Utility Architecture SQL Server Utility • Utility Explorer and SQL Server Utility viewpoints (in SSMS) provide administrators a holistic view of resource health through an instance of SQL Server that serves as a utility control point (UCP). • Entities viewable in a SQL Server UCP include instances of SQL Server, data-tier applications, database files and storage volumes. Resource use can be monitored for CPU and storage use. Summary • SQL Server encryption provides an additional security protection from hackers or eavesdroppers. • While someone might access your file stream or table, they will find the information undecipherable. • This comes at the expense of additional overhead. Summary • With auditing you can create a record of what happens on your SQL Server instance. You can record successful connections to learn who uses what resources how often. • A management report might be appropriate to reward diligent employees. • With SQL Utility you can monitor the resource health of your entire enterprise and produce near real-time management and analysis reports. Summary for Certification Examination • Know how to configure encryption on a column. • Understand transparent data encryption and its value. • For a given situation, determine which auditing technique can be of value.