Transparent Data Encryption (TDE)

SQLServerCentral Article

TDE BYOK and Geo-Replication in Azure SQL DB

  • Article

Recently a customer asked me for help with setting up a test of an Azure SQL Database in the single database tier with Geo-Replication to work with Transparent Data Encryption (TDE) with a customer-managed key, also known as Bring Your Own Key (BYOK). It is very simple to do it when you use service-managed keys, […]

5 (3)

You rated this post out of 5. Change rating

2020-07-21

2,527 reads

Stairway to TDE icon

Restore a Backup of a TDE Database to Another Server: Level 2 of the Stairway to TDE

  • Stairway Step

In the second level of the stairway to TDE, we examine how you can restore your databases on another instance after moving the encryption certificate.

5 (3)

You rated this post out of 5. Change rating

2024-06-26 (first published: )

51,755 reads

Stairway to TDE icon

Transparent Data Encryption Using Certificates and EKM - Level 1 of the Stairway to TDE

  • Stairway Step

The first level of the Stairway to TDE will explain how the feature works and how to set this up on one of your instances and databases.

5 (3)

You rated this post out of 5. Change rating

2024-06-26 (first published: )

11,029 reads

SQLServerCentral Article

6 steps to a more secure SQL database

  • Article

Security is often something people think about only after they have had a problem. Given that the average cost of a data breach is $3.92 million (SecurityIntelligence 2019) and ransomware attacks have increased 97% over the past 2 years (PhishMe 2019), the "if it's not broke, don't fix it" approach can clearly be catastrophic. Here […]

5 (2)

You rated this post out of 5. Change rating

2019-10-07

9,355 reads

SQLServerCentral Article

Key Rotation in TDE

  • Article

Transparent Data Encryption (TDE) has been around for a long time. It first appeared in SQL Server 2008, and after a rocky start with some bugs, it has become a regularly used feature for many organizations. While not perfect, it does provide some protection and auditors like to see physical protection features being used. It's […]

You rated this post out of 5. Change rating

2019-08-29

14,982 reads

Blogs

Azure Networking: Designing for Change

By

Failing to plan is planning to fail. When organizations first begin implementing Azure networking,...

Using Customer Docker Compose File Names

By

As I use containers more and more to run various things, I decided I...

SQL Server Failover Cluster Instances

By

Old Reliable Still Matters If you’ve been around SQL Server for a while, you’ve...

Read the latest Blogs

Forums

SQL Server authentication vs. Trusted connection

By Rod at work

I maintain an application written years ago, where the database is on a Windows...

Handling Engagement Rings & Wedding Band

By iBling Jewels

I’m working on a jewelry e-commerce project and need advice on designing an efficient...

The Duplicate Cursor

By Steve Jones - SSC Editor

Comments posted to this topic are about the item The Duplicate Cursor

Visit the forum

Question of the Day

The Duplicate Cursor

Can I run this code:

DECLARE ANewTable CURSOR FOR 
SELECT * FROM ANewTable

See possible answers