70-764 Administering a SQL Database Infrastructure Flashcards
What is one of the most important assets to an organization?
Data
What 3 ways can you protect your organization’s data?
protect sensitive data through encryption, to control data access, and importantly to audit data access
What 4 forms does data loss come in?
hardware failure, database corruption, malicious activity, and user error
What is the is a critical capability in any modern database engine?
The ability to encrypt data at the column level
When did Column-level encryption become available?
Column-level encryption has been supported since SQL Server 2005
How are layers of encryption protected?
Layers of encryption are protected by preceding layers of encryption that can use asymmetric keys, certificates, and symmetric keys.
Extensible Key Management
SQL Server EKM enables the encryption keys that protect the database files to be stored outside of the SQL Server environment such as a smartcard, a USB device, and the EKM module of Hardware Security Module (HSM). It also helps secure the SQL Server instance from database administrators because they will not necessarily have access to the external EKM/HSM module.
Service Master Key
The Service Master Key (SMK) is the root of the database engine’s encryption hierarchy and is generated automatically the first time it is needed to encrypt another key. By default, the SMK is encrypted using the Windows data protection API (DPAPI) at the operating system level, which uses the local machine key. The SMK can only be opened by the Windows service account that created it, or by a principal that knows the service account name and its password.
Database Master Key
The Database Master Key (DMK) is a symmetric key used to protect the private keys of certificates and asymmetric keys that are present in the database.
When created it is encrypted using AES_256 and a password you provide. Query the [sys].[symmetric_keys] catalog view to get information about the DMK.
Asymmetric Key
An asymmetric key consists of a private and corresponding public key. Asymmetric encryption is computationally more expensive, but more secure than
symmetric encryption. You can use an asymmetric key to encrypt a symmetric key within a database.
Symmetric Key
A symmetric key is a single key that uses encryption. Symmetric encryption is generally used over asymmetric encryption because it is faster and less computationally expensive.
Certificate
Certificates are a digitally signed security object that contain a public (and ptionally a private) key for SQL Server, which can generate certificates. You can also
use externally generated certificates, and just like with asymmetric keys, certificates cane used in asymmetric encryption.
Can encrypted data be compressed?
Encrypted data cannot be compressed, but compressed data can be encrypted. When using compression, you should compress data before encrypting it for optimal results.
How does stronger encryption affect processor resources?
Stronger encryption algorithms consume more processor resources.
How can the database engine take advantage of hardware acceleration?
Starting with SQL Server 2016 the database engine can take advantage of hardware acceleration, using Intel AES-NI, when performing encryption/decryption tasks.