SQL Server Transparent Data Encryption: Protecting Database Files at Rest

SQL Server Transparent Data Encryption: Protecting Database Files at Rest

English | MP4 | AVC 1920×1080 | AAC 44KHz 2ch | 0h 34m | 156 MB

Protect yourself against data theft through unauthorized access to the physical database files and their copies that may be found in backup sets and transaction logs. Thwart unauthorized access to those files by making use of SQL Server’s Transparent Data Encryption (TDE) feature to provide at-rest encryption of an entire database such that only authorized instances of SQL Server can read the data, log, and backup files.
This video explains how the TDE feature works and shows how to implement at-rest encryption using best practices. It also covers independent backup encryption for an additional layer of protection. The video begins with an introduction to TDE and the pros and cons of its implementation. It talks about the use case for applying this type of encryption. The video then walks you through implementing TDE on a new database or existing database. Next, it will cover how to manage the movement of these encrypted databases. Finally, you’ll cover independent backup encryption.
What You Will Learn

  • Recognize use cases for Transparent Data Encryption
  • Encrypt your entire database, including log and backup files
  • Preserve encryption keys and restore from encrypted backups
  • Manage encryption through dynamic management objects
  • Encrypt database backups independently of TDE
  • Move a TDE encrypted database, including log files
Table of Contents

1 Introduction
2 Protecting Data at Rest
3 Encryption Hierarchy
4 Encrypting a Database
5 Managing TDE
6 Moving a TDE Enabled Database
7 Encrypting a Database Backup
8 Wrap Up