Pro Encryption in SQL Server 2022 Provide the Highest Level of Protection for Your Data

The book highlights work that Microsoft has been doing since 2016 to make encryption more accessible, by making TDE available in the standard edition, and the introduction of Always Encrypted that requires minimal work on your part to implement powerful and effective encryption, protecting your data...

Full description

Bibliographic Details
Main Author: McGiffen, Matthew
Format: eBook
Language:English
Published: Berkeley, CA Apress 2022, 2022
Edition:1st ed. 2022
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 04524nmm a2200349 u 4500
001 EB002135600
003 EBX01000000000000001273657
005 00000000000000.0
007 cr|||||||||||||||||||||
008 221201 ||| eng
020 |a 9781484286647 
100 1 |a McGiffen, Matthew 
245 0 0 |a Pro Encryption in SQL Server 2022  |h Elektronische Ressource  |b Provide the Highest Level of Protection for Your Data  |c by Matthew McGiffen 
250 |a 1st ed. 2022 
260 |a Berkeley, CA  |b Apress  |c 2022, 2022 
300 |a XXIV, 351 p. 104 illus  |b online resource 
505 0 |a Introduction -- Part I. Understanding the Landscape -- 1. Purpose of Encryption and Available Tools -- Part II. Transparent Data Encryption (TDE) -- 2. Introducing Transparent Data Encryption -- 3. Setting Up TDE -- 4. Managing TDE -- 5. Backup Encryption -- Part III. Always Encrypted -- 6. What Is Always Encrypted? -- 7. Setting Up Always Encrypted -- 8. Executing Queries Using Always Encrypted -- 9. Encrypting Existing Data with Always Encrypted -- 10. Limitations with Always Encrypted -- 11. Key Rotation with Always Encrypted -- 12. Considerations When Implementing Always Encrypted -- Part IV. Always Encrypted with Enclaves -- 13. Introducing Always Encrypted With Enclaves -- 14. Setting Up Always Encrypted With Enclaves -- 15. In-Place Encryption With Always Encrypted -- Part V. Completing the Picture -- 16. Rich Querying With Always Encrypted Enclaves -- 17. Setting Up TPM Attestation -- 18. Encryption In Transit Using Transport Level Security -- 19. Hashing and Salting of Passwords -- 20. Extensible Key Management (EKM) -- Appendixes -- A. Glossary of Terms -- B. Encryption in the Cloud -- C. Encryption Algorithms 
653 |a Microsoft software 
653 |a Microsoft 
653 |a Database Management 
653 |a Data protection 
653 |a Microsoft .NET Framework 
653 |a Data and Information Security 
653 |a Database management 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
028 5 0 |a 10.1007/978-1-4842-8664-7 
856 4 0 |u https://doi.org/10.1007/978-1-4842-8664-7?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.268 
520 |a The book highlights work that Microsoft has been doing since 2016 to make encryption more accessible, by making TDE available in the standard edition, and the introduction of Always Encrypted that requires minimal work on your part to implement powerful and effective encryption, protecting your data and meeting regulatory requirements. The book teaches you how to work with the encryption technologies in SQL Server with the express goal of helping you understand those technologies on an intuitive level. You’ll come away with a deep level of understanding that allows you to answer questions and speak as an expert. The book’s aim is to make you as comfortable in deploying encryption in SQL Server as you would be in driving your car to buy groceries. Those with a data security mindset will appreciate the discussion of how each feature protects you and what it protects you from, as well as how to implement things in the most secure manner.  
520 |a This in-depth look at the encryption tools available in SQL Server shows you how to protect data by encrypting it at rest with Transparent Data Encryption (TDE) and in transit with Transport Level Security (TLS). You will know how to add the highest levels of protection for sensitive data using Always Encrypted to encrypt data also in memory and be protected even from users with the highest levels of access to the database. The book demonstrates actions you can take today to start protecting your data without changing any code in your applications, and the steps you can subsequently take to modify your applications to support implementing a gold standard in data protection.  
520 |a Database administrators will appreciate the high level of detail around managing encryption over time and the effect of encryption on database performance. All readers will appreciate the advice on how to avoid common pitfalls, ensuring that your projects to implement encryption run smoothly. What You Will Learn Architect an effective encryption strategy for new applications Retrofit encryption into your existing applications Encrypt data at rest, in memory, and in transit Manage key and certificate life cycles, including backup and restore Recover encrypted databases in case of server failure Work with encryption in cloud-based scenarios