Transparent Data Encryption (TDE)

SQLServerCentral Article

TDE BYOK and Geo-Replication in Azure SQL DB

  • Article

Recently a customer asked me for help with setting up a test of an Azure SQL Database in the single database tier with Geo-Replication to work with Transparent Data Encryption (TDE) with a customer-managed key, also known as Bring Your Own Key (BYOK). It is very simple to do it when you use service-managed keys, […]

(3)

You rated this post out of 5. Change rating

2020-07-21

2,542 reads

Stairway to TDE icon

Restore a Backup of a TDE Database to Another Server: Level 2 of the Stairway to TDE

  • Stairway Step

In the second level of the stairway to TDE, we examine how you can restore your databases on another instance after moving the encryption certificate.

(3)

You rated this post out of 5. Change rating

2024-06-26 (first published: )

53,440 reads

Stairway to TDE icon

Transparent Data Encryption Using Certificates and EKM - Level 1 of the Stairway to TDE

  • Stairway Step

The first level of the Stairway to TDE will explain how the feature works and how to set this up on one of your instances and databases.

(3)

You rated this post out of 5. Change rating

2024-06-26 (first published: )

11,356 reads

SQLServerCentral Article

6 steps to a more secure SQL database

  • Article

Security is often something people think about only after they have had a problem. Given that the average cost of a data breach is $3.92 million (SecurityIntelligence 2019) and ransomware attacks have increased 97% over the past 2 years (PhishMe 2019), the "if it's not broke, don't fix it" approach can clearly be catastrophic. Here […]

(2)

You rated this post out of 5. Change rating

2019-10-07

9,364 reads

SQLServerCentral Article

Key Rotation in TDE

  • Article

Transparent Data Encryption (TDE) has been around for a long time. It first appeared in SQL Server 2008, and after a rocky start with some bugs, it has become a regularly used feature for many organizations. While not perfect, it does provide some protection and auditors like to see physical protection features being used. It's […]

You rated this post out of 5. Change rating

2019-08-29

15,341 reads

Blogs

Using Prompt AI for a Travel Data Analysis

By

I was looking back at my year and decided to see if SQL Prompt...

FinOps for Kubernetes: Leveraging OpenCost, KubeGreen, and Kubecost for Cost Efficiency

By

In the era of cloud-native applications, Kubernetes has become the default standard platform for...

2025 Wrapped for Steve

By

I’ve often done some analysis of my year in different ways. Last year I...

Read the latest Blogs

Forums

reaching ftp thru winscp but erroring in ssis ftp task connection

By stan

Hi, below i show various results trying to reach our ftp site (a globalscape...

Finding Motivation

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Finding Motivation

The Last Binary Value of the Year

By Steve Jones - SSC Editor

Comments posted to this topic are about the item The Last Binary Value of...

Visit the forum

Question of the Day

The Last Binary Value of the Year

What does this code return?

SELECT cast(0x2025 AS NVARCHAR(20))
Image 1: Image 2: Image 3: Image 4:

See possible answers