additional security tools

20
Additional Security Tools Additional Security Tools Lesson 15

Upload: jalila

Post on 09-Feb-2016

38 views

Category:

Documents


1 download

DESCRIPTION

Additional Security Tools. Lesson 15. Skills Matrix. Guarding Your Data. Maintaining data integrity can also involve data encryption and auditing. Encryption. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Additional Security Tools

Additional Security ToolsAdditional Security ToolsLesson 15

Page 2: Additional Security Tools

Skills MatrixSkills Matrix

Page 3: Additional Security Tools

Guarding Your DataGuarding Your Data• Maintaining data integrity can also

involve data encryption and auditing.

Page 4: Additional Security Tools

EncryptionEncryption• You can put another layer,

encryption, on top of all this security. SQL Server encrypts data with hierarchical encryption and key management infrastructure.

• Each layer encrypts the layer below it by using a combination of certificates, asymmetric keys, and symmetric keys, in scopes that parallel the permissions hierarchy

Page 5: Additional Security Tools

SQL Server EncryptionSQL Server Encryption• To encrypt your connections to SQL Server,

you first need to get a certificate. • You can get one from one of the major

vendors such as VeriSign, or you can install Windows Certificate services and supply your own.

• Once you have a certificate, you need to install it on the server.

• Finally, you need to configure the clients to request encrypted connections to the server.

Page 6: Additional Security Tools

SQL Server EncryptionSQL Server Encryption• The database-level cryptographic

features in SQL Server rely on a database master key.

• This key does not generate automatically when you create the database.– It must be created by the system

administrator. • You need but one master key per

database.

Page 7: Additional Security Tools

Transparent Data EncryptionTransparent Data Encryption• SQL Server 2008 includes a new feature known

as Transparent Data Encryption (TDE). • This encryption is transparent to the application

code as SQL Server 2008 automatically handles the encryption and decryption of all data going in to and out of the database.

• The primary purpose of this TDE feature is to have the entire database encrypted so that any unauthorized person having direct access to copies of the database files and / or transaction log files cannot decrypt and read the data.

Page 8: Additional Security Tools

Transparent Data EncryptionTransparent Data Encryption• It is critically important to understand that

the database master key and the encryption certificate need to be backed up to a secure location.

• This location also needs to be separate from regular backups or other copies of the database files.

• The encryption security provided by TDE is meaningless if database files and the certificate both fall into the hands of the wrong person.

Page 9: Additional Security Tools

Extensible Key ManagementExtensible Key Management• SQL Server 2008 includes a new feature known as

Extensible Key Management (EKM). • This is a method of providing for encryption methods

using software and possibly hardware such as smart cards or USB devices provided by third-party entities.

• With EKM, encryption can be established using physical hardware known as a Hardware Security Module (HSM).

• This can be a more secure solution because the encryption keys do not reside with encrypted data in the database.

• Instead, the keys are stored on the hardware device.

Page 10: Additional Security Tools

AuditsAudits• Audits keep a record of database

activities. Set configuration options for the factors of concern and then review the results.

• If you suspect someone uses an employee’s login inappropriately, audit for logins and look for suspicious behaviors.

Page 11: Additional Security Tools
Page 12: Additional Security Tools

C2 CriteriaC2 Criteria• In 1985, the Department of Defense published

DOD Directive 5200.28-STD, Department of Defense Standard, “Department of Defense Trusted Computer System Evaluation Criteria” known familiarly as the “Orange Book” which was part of the “Rainbow Series” of security evaluation criteria.

• The Orange Book laid out a matrix where A was the most trusted and D the least trusted.

• Numbers were also used where 1 was the most stringent criteria.

• The resultant classes, then, are A1, B1, B2, B3, C1, C2 and D.

Page 13: Additional Security Tools

C2 CriteriaC2 Criteria• C2 requires controlled access

protection and is deemed appropriate for “business sensitive” data—less guarded then confidential, secret or top secret classifications.

• C2 requires individual accountability through login procedures, audit trails, object reuse and resource isolation.

• SQL Server provides these protections

Page 14: Additional Security Tools

AuditingAuditing• Auditing an instance of SQL Server or

a SQL Server database involves tracking and logging events that occur on the system.

• SQL Server Utility provides you a means to audit and manage your SQL Server environment as a whole through the concept of application and multiserver management.

Page 15: Additional Security Tools

SQL Server UtilitySQL Server Utility• SQL Server Utility provides you a

means to audit and manage your SQL Server environment as a whole through the concept of application and multiserver management.

• The SQL Server Utility models your organization’s SQL Server-related entities in a unified view.

Page 16: Additional Security Tools

SQL ServerSQL ServerUtility Utility ArchitectureArchitecture

Page 17: Additional Security Tools

SQL Server UtilitySQL Server Utility• Utility Explorer and SQL Server Utility

viewpoints (in SSMS) provide administrators a holistic view of resource health through an instance of SQL Server that serves as a utility control point (UCP).

• Entities viewable in a SQL Server UCP include instances of SQL Server, data-tier applications, database files and storage volumes. Resource use can be monitored for CPU and storage use.

Page 18: Additional Security Tools

SummarySummary• SQL Server encryption provides an

additional security protection from hackers or eavesdroppers.

• While someone might access your file stream or table, they will find the information undecipherable.

• This comes at the expense of additional overhead.

Page 19: Additional Security Tools

SummarySummary• With auditing you can create a record of

what happens on your SQL Server instance. You can record successful connections to learn who uses what resources how often.

• A management report might be appropriate to reward diligent employees.

• With SQL Utility you can monitor the resource health of your entire enterprise and produce near real-time management and analysis reports.

Page 20: Additional Security Tools

Summary for Certification ExaminationSummary for Certification Examination• Know how to configure encryption on

a column.• Understand transparent data

encryption and its value.• For a given situation, determine

which auditing technique can be of value.