Microsoft SQL Server
This document provides information about configuring the Futurex KMES Series 3 with Microsoft SQL Server Transparent Data Encryption (TDE) by using EKM libraries. For additional questions related to your KMES Series 3 device, see the relevant user guide.
Microsoft SQL Server is a relational database management system (RDBMS) used for large-scale online transaction processing (OLTP), data warehousing, and e-commerce applications. It is also a business intelligence platform for data integration, analysis, and reporting solutions.
From the Microsoft documentation website:
Transparent Data Encryption (TDE) encrypts SQL Server data files. This encryption is known as encrypting data at rest.
To help secure a database, you can take precautions like:
- Designing a secure system.
- Encrypting confidential assets.
- Building a firewall around the database servers.
However, a malicious party who steals physical media like drives or backup tapes can restore or attach the database and browse its data.
One solution is to encrypt sensitive data in a database and use a certificate to protect the keys that encrypt the data. This solution prevents anyone without the keys from using the data. But you must plan this kind of protection in advance.
TDE does real-time I/O encryption and decryption of data and log files. The encryption uses a database encryption key (DEK). The database boot record stores the key for availability during recovery. The DEK is a symmetric key. It's secured by a certificate that the server's master database stores or by an asymmetric key that an EKM module protects.
TDE protects data at rest, which is the data and log files. It lets you follow many laws, regulations, and guidelines established in various industries. This ability lets software developers encrypt data by using AES and 3DES encryption algorithms without changing existing applications.
Through Extensible Key Management (EKM), Microsoft SQL Server can use a Futurex KMES Series 3 for key management and encryption acceleration.
In this configuration, you can encrypt data by using encryption keys that only the database user has access to on the external EKM or HSM module.
Only the database-level items (such as the database encryption key) are user-configurable when you use TDE on your SQL Database.
This guide covers the following tasks:
- Generate a certificate signing request from a certreq policy file.
- Configure the KMES Series 3.
- Create an association between the signed Microsoft SQL Server certificate and the key pair.
- Install and configure the FXCL EKM.
- Configure EKM in Microsoft SQL Server.
- Enable TDE in Microsoft SQL Server.
The following sections show you how to perform these tasks.