Comments on: Transparent Data Encryption Considerations https://thomaslarock.com/2010/02/transparent-data-encryption-considerations/ Thomas LaRock is an author, speaker, data expert, and SQLRockstar. He helps people connect, learn, and share. Along the way he solves data problems, too. Fri, 09 Jun 2017 15:52:00 +0000 hourly 1 https://wordpress.org/?v=6.7.2 By: Ricky Kingston https://thomaslarock.com/2010/02/transparent-data-encryption-considerations/#comment-16003 Fri, 09 Jun 2017 15:52:00 +0000 http://thomaslarock.com/?p=3704#comment-16003 Great tutorial! I learned here: http://www.winzip.com/win/en/learn/data-encryption.html about data encryption and I use it to keep my data safe, but as I read your tutorial I think there is much more for me to learn . Thank you for sharing

]]>
By: Sergeant SQL https://thomaslarock.com/2010/02/transparent-data-encryption-considerations/#comment-1268 Mon, 22 Feb 2010 04:54:05 +0000 http://thomaslarock.com/?p=3704#comment-1268 Hey Thomas,

You’re right, the TempDB encryption is buried in the fine print when it should be circled in red. I try to draw attention to it every time I give an encryption presentation, along with the other “little things” that seem to fly under the radar with TDE–the things that can have a direct impact on your architecture decisions and performance.

Your post will definitely get people thinking about some of the “side effects” of TDE. And that’s exactly what they need to help them make better decisions about when and where to use this feature! Kudos!

]]>
By: Thomas LaRock https://thomaslarock.com/2010/02/transparent-data-encryption-considerations/#comment-1267 Mon, 22 Feb 2010 04:09:42 +0000 http://thomaslarock.com/?p=3704#comment-1267 In reply to Sergeant SQL.

good points Michael, thanks.

i don’t think many people are aware about the tempdb encryption. it’s not that it doesn’t make sense to need your tempdb to be encrypted; it’s that it isn’t well known, in my opinion. and it could also be the case that it might make more sense to have a tempdb for each database, rather than only one shared tempdb per instance. of course that will never happen, but we can all dream, right?

]]>
By: Sergeant SQL https://thomaslarock.com/2010/02/transparent-data-encryption-considerations/#comment-1266 Mon, 22 Feb 2010 00:43:44 +0000 http://thomaslarock.com/?p=3704#comment-1266 Encrypting TempDB makes perfect sense. If you didn’t encrypt TempDB you can leak information as unencrypted data is being stored in it. If you’re worried about performance keep your TDE-encrypted databases on separate instances from your non-encrypted databases. Logs are also encrypted, btw.

The reason Filestream is not encrypted is because TDE operates on SQL Server’s IO buffers. Filestream bypasses the IO buffers to give you performance enhancement. I suspect you could use Windows file encryption (EFS, BitLocker) facilities on Filestream data, although I have to admit I haven’t actually tried it yet.

For me the downside of TDE is that it only protects against file theft. Anyone who can get their hands on a login with appropriate rights can see all your data as if it were stored unencrypted. Cell-level encryption gives you fine-grained control (the trade-off being performance, of course).

]]>
By: John Sansom https://thomaslarock.com/2010/02/transparent-data-encryption-considerations/#comment-1265 Tue, 16 Feb 2010 19:21:47 +0000 http://thomaslarock.com/?p=3704#comment-1265 That’s quite a show stopper right there with regard to the tempdb being encrypted when TDE is enabled for a single database and was not something I was aware of. It could even rule out the possibility of its use completely for some environments.

Thanks for the heads up!

]]>