Transparent Data Encryption (TDE)

SQLServerCentral Article

TDE BYOK and Geo-Replication in Azure SQL DB

  • Article

Recently a customer asked me for help with setting up a test of an Azure SQL Database in the single database tier with Geo-Replication to work with Transparent Data Encryption (TDE) with a customer-managed key, also known as Bring Your Own Key (BYOK). It is very simple to do it when you use service-managed keys, […]

5 (3)

You rated this post out of 5. Change rating

2020-07-21

2,531 reads

Stairway to TDE icon

Restore a Backup of a TDE Database to Another Server: Level 2 of the Stairway to TDE

  • Stairway Step

In the second level of the stairway to TDE, we examine how you can restore your databases on another instance after moving the encryption certificate.

5 (3)

You rated this post out of 5. Change rating

2024-06-26 (first published: )

52,334 reads

Stairway to TDE icon

Transparent Data Encryption Using Certificates and EKM - Level 1 of the Stairway to TDE

  • Stairway Step

The first level of the Stairway to TDE will explain how the feature works and how to set this up on one of your instances and databases.

5 (3)

You rated this post out of 5. Change rating

2024-06-26 (first published: )

11,148 reads

SQLServerCentral Article

6 steps to a more secure SQL database

  • Article

Security is often something people think about only after they have had a problem. Given that the average cost of a data breach is $3.92 million (SecurityIntelligence 2019) and ransomware attacks have increased 97% over the past 2 years (PhishMe 2019), the "if it's not broke, don't fix it" approach can clearly be catastrophic. Here […]

5 (2)

You rated this post out of 5. Change rating

2019-10-07

9,359 reads

SQLServerCentral Article

Key Rotation in TDE

  • Article

Transparent Data Encryption (TDE) has been around for a long time. It first appeared in SQL Server 2008, and after a rocky start with some bugs, it has become a regularly used feature for many organizations. While not perfect, it does provide some protection and auditors like to see physical protection features being used. It's […]

You rated this post out of 5. Change rating

2019-08-29

15,103 reads

Blogs

Fabric as a Data Mesh Enabler: Rethinking Enterprise Data Distribution

By

For decades, enterprises have approached data management with the same mindset as someone stuffing...

Truncate Table Pitfalls

By

 Truncate Table Pitfalls Truncating a table can be gloriously fast—and spectacularly dangerous when used carelessly....

dataMinds Connect 2025 – Slides & Scripts

By

You can find all the session materials for the presentation “Indexing for Dummies” that...

Read the latest Blogs

Forums

Technological Dinosaurs or Social Dinosaurs?

By Grant Fritchey

Comments posted to this topic are about the item Technological Dinosaurs or Social Dinosaurs?

DBCC CHECKIDENT

By Steve Jones - SSC Editor

Comments posted to this topic are about the item DBCC CHECKIDENT

Distributed Availability Group Health: T-SQL and Zabbix

By Pablo Echeverria

Comments posted to this topic are about the item Distributed Availability Group Health: T-SQL...

Visit the forum

Question of the Day

DBCC CHECKIDENT

What is returned as a result set when I run this command without a new seed value?

See possible answers