SlideShare a Scribd company logo
Protecting your Key Asset  – Data Protection Best Practices  Vinod Kumar M Technology Evangelist Microsoft Corporation www.ExtremeExperts.com
Agenda “ Best Practices” is a broad area This talk focuses on operational tasks Look at various Data aspects
“ Security…But isn’t that the Admin’s Job?”
Understanding Basic Security Restricting user access Disabling services and restricting service configuration Reducing the surface area of attack for new features
Defense in Depth Always design your countermeasures to have at least two levels of defense This means that you put your defenses in serially rather than in parallel; attackers needs to overcome A  and  B – not A  or  B Use all the available countermeasures – technology, process, people Countermeasures and vulnerabilities are really two sides of the same coin
Incidents Reported Industry Wide CERT/CC incident statistics 1988 through 2006 Incident: single security issue grouping together all impacts of that that issue Issue: disruption, DOS, loss of data, misuse, damage, loss of confidentiality Source: http://www.cert.org/stats/cert_stats.html 0 20000 40000 60000 80000 100000 120000 160000 180000 '88 '90 '92 '94 '96 '98 '00 '02
Know Your Enemy Port Scanners Black Hat Community Sharing Brute Force pwd  crackers Dictionary Based pwd crackers Network Sniffers De-compilers Debuggers Cracker Tools
Mobile Device – Security Aspect
Mobile – Entry Points Access to Device Access to Store-Data Access to wireless networks
Mobile – Security Practices  Risk Analysis Make Security policies Password Anti-Virus Software Encryption Need-to-know Data store
Mobile – Security Practices Authentication Perimeter Security Encryption Data Encryption – Pocket PC (SQL CE – 128 bit encryption) App Encryption – .NET CF & High Encryption Pack Information Service Encryption Network Encryption Lock- Down Functionality
Desktop Data Security
Where is Customer’s Data Stored? Q: Where is the biggest data exposure risk? SQL
Clients Documents Where do customers’   users keep their documents? User Profile Outlook, Sharepoint, Desktop, Temp, IE… per-machine data Search index, offline file cache, pagefile… Non-standard locations … ISV & in-house apps
What is EFS?
Encrypting File System  Privacy of data that goes beyond access control Protect confidential data on laptops  Configurable approach to data recovery Integrated with core operating  system components  Windows NT File System - NTFS Crypto API key management LSA security policy Transparent and very high performance
What EFS is not… A way to protect local user credentials A way to protect data in transit (think IPSec) A way to protect business transaction documents (think Windows Rights Management)
EFS File Encryption RNG Data decryption field generation (RSA) Data recovery field generation (RSA) DDF DRF User’s public  key Recovery agent’s public  key in recovery policy Randomly- generated file encryption key (FEK) File encryption (e.g. AES) A quick  brown fox jumped... *#$fjda^j u539!3t t389E *&
EFS File Decryption *#$fjda^j u539!3t t389E *& DDF A quick  brown fox jumped... DDF extraction (RSA) File decryption (e.g. AES) File encryption key DDF is decrypted using the user’s  private key  to get the file encryption key DDF contains file encryption key encrypted under user’s  public key User’s  private key
EFS File  Recovery *#$fjda^j u539!3t t389E *& DRF A quick  brown fox jumped... DRF  extraction (RSA) File decryption (e.g. AES) File encryption key DRF  is decrypted using the  DRA ’s  private key  to get the file encryption key DRF  contains file encryption key encrypted under  DRA ’s  public key DRA ’s  private key
EFS best practices: recovery No local Recovery Agents Prevents data comprise in “stolen laptop” scenario Prevents out-of-process data recovery… if encrypted data needs to be recovered, it should be an audited operation Have at least 2 Recovery Agents per domain Encrypt directories, not files Ensures that temp files created in process are also encrypted Prevents data recovery from free space on the file system Encrypt CSC cache (Offline Files) Protects temporary files that maybe written during application execution
Document Protection
Windows Rights Management Services (RMS) Information protection technology that augments security strategies Users can easily safeguard sensitive information from unauthorized use Organizations can centrally manage internal information usage policies Uses RMS Server, RMS Client and RMS-enabled apps RMS protects information both online and  offline, inside and outside of the firewall.
RMS Publishing Flow (“online”) File Recipient File Author RM Server Author creates a file and defines a set of rights and rules. Application encrypts file and sends unsigned “publishing license” to RMS; Server signs and returns publishing license. Author distributes file. Application renders file and enforces rights. Recipient clicks file to open, the application calls to RMS which validates the user and the request and issues the “use license”. Database Server File Server
If I could choose one, which one would I choose when? EFS – to encrypt all local data files automatically, under my domain account, to minimize risk of offline attack RMS – to share encrypted files easily among a group of people, or send them encrypted over the wire to any storage medium
Database Security
What are Principals? Principals Permissions Securables Server Role SQL Server Login SQL Server Windows Group Domain User Account Local User Account Windows User Database Role Application Role Group Database
What are Securables? Principals Permissions Securables Files Registry Keys Server Schema Database Server Role SQL Server Login SQL Server Windows Group Domain User Account Local User Account Windows User Database Role Application Role Group Database
What are Permissions? Principals Permissions Securables Files Registry Keys Server Schema Database CREATE ALTER DROP CONTROL CONNECT SELECT EXECUTE UPDATE DELETE INSERT TAKE OWNERSHIP VIEW DEFINITION BACKUP GRANT/REVOKE/DENY ACL Server Role SQL Server Login SQL Server Windows Group Domain User Account Local User Account Windows User Database Role Application Role Group Database
Database Security Surface Area Reduction Authentication Mode Password Policies enforcement Administrative Privileges Catalog Security Encryption Auditing
Demo …
Summary Security is integral part of all software Maximize SQL Security to protect sensitive data Encryption is cool : Use it carefully though Understand the password policies of organization Block standard/un-used default ports Lastly, Understand  all  the entry points to your application
Questions ?
Resources Encrypting File System in Windows XP and Windows Server 2003 http://www.microsoft.com/technet/prodtechnol/winxppro/deploy/cryptfs.mspx Best practices for the Encrypting File System http://support.microsoft.com/default.aspx?scid=kb;en-us;223316&sd=tech What's New in Security for Windows XP Professional and Windows XP Home Edition http://www.microsoft.com/technet/prodtechnol/winxppro/evaluate/xpsec.mspx
Resources SQL Server : Security Blog http://blogs.msdn.com/lcris/ SQL Server Security and Protection http://www.microsoft.com/technet/prodtechnol/sql/2005/library/security.mspx What's New in Security for Windows XP http://www.microsoft.com/technet/prodtechnol/winxppro/evaluate/xpsec.mspx

More Related Content

What's hot (20)

PDF
HCLOS.Reduce to 600 dpi average quality
Vinayak Wadhwa
 
PDF
Russia the threat landscape
Альбина Минуллина
 
PPTX
Fatal signs: 10 symptoms when you think you’ve been hacked
Paula Januszkiewicz
 
PDF
ISTSEC 2013 - Bulut Bilişim ve Güvenlik
BGA Cyber Security
 
PPTX
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
BlueHat Security Conference
 
PDF
13. Neville Varnham - PeopleSoft Cyber Security
Cedar Consulting
 
PDF
Waf.js: How to Protect Web Applications using JavaScript
Denis Kolegov
 
PDF
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
Kuniyasu Suzaki
 
PPTX
Breaking the cyber kill chain!
Nahidul Kibria
 
PPTX
DFIR Austin Training (Feb 2020): Remote Access & Deploying Agents
Christopher Gerritz
 
PDF
5345wp tops vse_ap_0109s
srkr1230
 
PDF
BSides Roma 2018 - Red team techniques
Guglielmo Scaiola
 
PPTX
Yihan Lian & Zhibin Hu - Smarter Peach: Add Eyes to Peach Fuzzer [rooted2017]
RootedCON
 
PDF
IstSec'14 - İbrahim BALİÇ - Automated Malware Analysis
BGA Cyber Security
 
PDF
Hunting Lateral Movement in Windows Infrastructure
Sergey Soldatov
 
PPTX
OpenStack Security Project
Travis McPeak
 
PPTX
Whats New in OSSIM v2.2?
AlienVault
 
PDF
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
Shawn Wells
 
PPTX
MongoDB World 2018: Low Hanging Fruit: Making Your Basic MongoDB Installation...
MongoDB
 
PDF
Atelier Technique CISCO ACSS 2018
African Cyber Security Summit
 
HCLOS.Reduce to 600 dpi average quality
Vinayak Wadhwa
 
Russia the threat landscape
Альбина Минуллина
 
Fatal signs: 10 symptoms when you think you’ve been hacked
Paula Januszkiewicz
 
ISTSEC 2013 - Bulut Bilişim ve Güvenlik
BGA Cyber Security
 
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
BlueHat Security Conference
 
13. Neville Varnham - PeopleSoft Cyber Security
Cedar Consulting
 
Waf.js: How to Protect Web Applications using JavaScript
Denis Kolegov
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
Kuniyasu Suzaki
 
Breaking the cyber kill chain!
Nahidul Kibria
 
DFIR Austin Training (Feb 2020): Remote Access & Deploying Agents
Christopher Gerritz
 
5345wp tops vse_ap_0109s
srkr1230
 
BSides Roma 2018 - Red team techniques
Guglielmo Scaiola
 
Yihan Lian & Zhibin Hu - Smarter Peach: Add Eyes to Peach Fuzzer [rooted2017]
RootedCON
 
IstSec'14 - İbrahim BALİÇ - Automated Malware Analysis
BGA Cyber Security
 
Hunting Lateral Movement in Windows Infrastructure
Sergey Soldatov
 
OpenStack Security Project
Travis McPeak
 
Whats New in OSSIM v2.2?
AlienVault
 
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
Shawn Wells
 
MongoDB World 2018: Low Hanging Fruit: Making Your Basic MongoDB Installation...
MongoDB
 
Atelier Technique CISCO ACSS 2018
African Cyber Security Summit
 

Viewers also liked (18)

PDF
Don't be part of the problem: The asset is the data!
RobSarfi
 
PPTX
Valuing the data asset
Bala Iyer
 
PDF
Hack back series data is an asset - registration strategies v0.1
Reputelligence
 
PPTX
Running a large commercial data asset
Matthias Zeller
 
PPTX
Data sovereignty issues: a 15 minute debrief for not-for-profits
rgtechnologies
 
PDF
Data Sovereignty and the Cloud
NEXTDC
 
PDF
Data monetization pov
Radhakrishnan R (RK)
 
PPTX
Making games pay: Data secrets for monetization
Lauren Cormack
 
PDF
Industrial Data Space - Why we need a European Initiative on Data Sovereignty
Thorsten Huelsmann
 
PPTX
Data Privacy, Security, and Sovereignty in a Cloudy World
Netskope
 
PPTX
Data sovereignty
Alvaro Soto
 
PPTX
The Data Asset
Darin Weidauer
 
PDF
WHY YOUR DATA ASSET IS YOUR GOLD MINE - JOHN ABBEY
Big Data Week
 
PDF
Internet of Things - Technological Perspective
Andri Yadi
 
PDF
Industrial Data Space: Digital Sovereignty for Industry 4.0 and Smart Services
Boris Otto
 
PPTX
Develop and Implement an Effective Data Management Strategy and Roadmap
Info-Tech Research Group
 
PPTX
Data Monetization– Mine data & Track Telecom customer behavior
Mahindra Comviva
 
PDF
Risk based thinking
Ramasubramanian S
 
Don't be part of the problem: The asset is the data!
RobSarfi
 
Valuing the data asset
Bala Iyer
 
Hack back series data is an asset - registration strategies v0.1
Reputelligence
 
Running a large commercial data asset
Matthias Zeller
 
Data sovereignty issues: a 15 minute debrief for not-for-profits
rgtechnologies
 
Data Sovereignty and the Cloud
NEXTDC
 
Data monetization pov
Radhakrishnan R (RK)
 
Making games pay: Data secrets for monetization
Lauren Cormack
 
Industrial Data Space - Why we need a European Initiative on Data Sovereignty
Thorsten Huelsmann
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Netskope
 
Data sovereignty
Alvaro Soto
 
The Data Asset
Darin Weidauer
 
WHY YOUR DATA ASSET IS YOUR GOLD MINE - JOHN ABBEY
Big Data Week
 
Internet of Things - Technological Perspective
Andri Yadi
 
Industrial Data Space: Digital Sovereignty for Industry 4.0 and Smart Services
Boris Otto
 
Develop and Implement an Effective Data Management Strategy and Roadmap
Info-Tech Research Group
 
Data Monetization– Mine data & Track Telecom customer behavior
Mahindra Comviva
 
Risk based thinking
Ramasubramanian S
 
Ad

Similar to Protecting Your Key Asset – Data Protection Best Practices V2.0 Final (20)

PPTX
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Quek Lilian
 
PPT
apsec 7 Golden Rules Data Leakage Prevention / DLP
andreasschuster
 
PDF
Filemaker security-protect-your-data
DB Services
 
PDF
Tips to Remediate your Vulnerability Management Program
BeyondTrust
 
PPS
Microsoft (Data Protection Solutions)
Vinayak Hegde
 
PPTX
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
centralohioissa
 
PPTX
Data Leakage Prevention
Microsoft TechNet - Belgium and Luxembourg
 
PPT
Protecting Sensitive Data using Encryption and Key Management
Stuart Marsh
 
PPTX
Data security
Tapan Khilar
 
PPT
Cybercrime future perspectives
SensePost
 
PDF
Perimeter Security is Failing
UL Transaction Security
 
PPSX
Lesson 9: Managing Files
Mahmmoud Mahdi
 
PPTX
Information Security Basics for Businesses and Individuals
Josh Moulin, MSISA,CISSP
 
PPT
Life After Compliance march 2010 v2
SafeNet
 
PDF
Operations Security Presentation
Wajahat Rajab
 
PDF
Safeguard Your Business
DWP Information Architects Inc.
 
DOCX
Discussion Question Contrast file encryption and volume encryptio.docx
JeniceStuckeyoo
 
DOCX
Securing data at rest with encryption
Ruban Deventhiran
 
PDF
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Ulf Mattsson
 
PPTX
INFORMATION AND CYBER SECURITY
Nishant Pawar
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Quek Lilian
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
andreasschuster
 
Filemaker security-protect-your-data
DB Services
 
Tips to Remediate your Vulnerability Management Program
BeyondTrust
 
Microsoft (Data Protection Solutions)
Vinayak Hegde
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
centralohioissa
 
Protecting Sensitive Data using Encryption and Key Management
Stuart Marsh
 
Data security
Tapan Khilar
 
Cybercrime future perspectives
SensePost
 
Perimeter Security is Failing
UL Transaction Security
 
Lesson 9: Managing Files
Mahmmoud Mahdi
 
Information Security Basics for Businesses and Individuals
Josh Moulin, MSISA,CISSP
 
Life After Compliance march 2010 v2
SafeNet
 
Operations Security Presentation
Wajahat Rajab
 
Safeguard Your Business
DWP Information Architects Inc.
 
Discussion Question Contrast file encryption and volume encryptio.docx
JeniceStuckeyoo
 
Securing data at rest with encryption
Ruban Deventhiran
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Ulf Mattsson
 
INFORMATION AND CYBER SECURITY
Nishant Pawar
 
Ad

More from Vinod Kumar (7)

PPTX
Backup beyond just a strategy with SQL Server
Vinod Kumar
 
PPTX
SQL Server Query Optimization, Execution and Debugging Query Performance
Vinod Kumar
 
PPT
Advanced t sql - querying and programming inside sql server
Vinod Kumar
 
PPT
Choosing a concurrency model, optimistic or pessimistic
Vinod Kumar
 
PPTX
Choosing A Concurrency Model, Optimistic Or Pessimistic
Vinod Kumar
 
PPT
Sql Server Security
Vinod Kumar
 
PPT
Windows Mobile 5.0 Data Access And Storage Webcast
Vinod Kumar
 
Backup beyond just a strategy with SQL Server
Vinod Kumar
 
SQL Server Query Optimization, Execution and Debugging Query Performance
Vinod Kumar
 
Advanced t sql - querying and programming inside sql server
Vinod Kumar
 
Choosing a concurrency model, optimistic or pessimistic
Vinod Kumar
 
Choosing A Concurrency Model, Optimistic Or Pessimistic
Vinod Kumar
 
Sql Server Security
Vinod Kumar
 
Windows Mobile 5.0 Data Access And Storage Webcast
Vinod Kumar
 

Recently uploaded (20)

PDF
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
PDF
Simplify Your FME Flow Setup: Fault-Tolerant Deployment Made Easy with Packer...
Safe Software
 
PDF
99 Bottles of Trust on the Wall — Operational Principles for Trust in Cyber C...
treyka
 
PDF
Kubernetes - Architecture & Components.pdf
geethak285
 
PDF
Understanding The True Cost of DynamoDB Webinar
ScyllaDB
 
PPSX
Usergroup - OutSystems Architecture.ppsx
Kurt Vandevelde
 
PPTX
01_Approach Cyber- DORA Incident Management.pptx
FinTech Belgium
 
PDF
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
 
PPTX
Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes
Cristian Garcia G.
 
PDF
Pipeline Industry IoT - Real Time Data Monitoring
Safe Software
 
PDF
Supporting the NextGen 911 Digital Transformation with FME
Safe Software
 
PPTX
Mastering Authorization: Integrating Authentication and Authorization Data in...
Hitachi, Ltd. OSS Solution Center.
 
PDF
FME as an Orchestration Tool with Principles From Data Gravity
Safe Software
 
PPTX
Enabling the Digital Artisan – keynote at ICOCI 2025
Alan Dix
 
PDF
Bridging CAD, IBM TRIRIGA & GIS with FME: The Portland Public Schools Case
Safe Software
 
PDF
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc
 
PDF
ICONIQ State of AI Report 2025 - The Builder's Playbook
Razin Mustafiz
 
PDF
Bitkom eIDAS Summit | European Business Wallet: Use Cases, Macroeconomics, an...
Carsten Stoecker
 
PDF
Unlocking FME Flow’s Potential: Architecture Design for Modern Enterprises
Safe Software
 
PDF
''Taming Explosive Growth: Building Resilience in a Hyper-Scaled Financial Pl...
Fwdays
 
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
Simplify Your FME Flow Setup: Fault-Tolerant Deployment Made Easy with Packer...
Safe Software
 
99 Bottles of Trust on the Wall — Operational Principles for Trust in Cyber C...
treyka
 
Kubernetes - Architecture & Components.pdf
geethak285
 
Understanding The True Cost of DynamoDB Webinar
ScyllaDB
 
Usergroup - OutSystems Architecture.ppsx
Kurt Vandevelde
 
01_Approach Cyber- DORA Incident Management.pptx
FinTech Belgium
 
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
 
Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes
Cristian Garcia G.
 
Pipeline Industry IoT - Real Time Data Monitoring
Safe Software
 
Supporting the NextGen 911 Digital Transformation with FME
Safe Software
 
Mastering Authorization: Integrating Authentication and Authorization Data in...
Hitachi, Ltd. OSS Solution Center.
 
FME as an Orchestration Tool with Principles From Data Gravity
Safe Software
 
Enabling the Digital Artisan – keynote at ICOCI 2025
Alan Dix
 
Bridging CAD, IBM TRIRIGA & GIS with FME: The Portland Public Schools Case
Safe Software
 
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc
 
ICONIQ State of AI Report 2025 - The Builder's Playbook
Razin Mustafiz
 
Bitkom eIDAS Summit | European Business Wallet: Use Cases, Macroeconomics, an...
Carsten Stoecker
 
Unlocking FME Flow’s Potential: Architecture Design for Modern Enterprises
Safe Software
 
''Taming Explosive Growth: Building Resilience in a Hyper-Scaled Financial Pl...
Fwdays
 

Protecting Your Key Asset – Data Protection Best Practices V2.0 Final

  • 1. Protecting your Key Asset – Data Protection Best Practices Vinod Kumar M Technology Evangelist Microsoft Corporation www.ExtremeExperts.com
  • 2. Agenda “ Best Practices” is a broad area This talk focuses on operational tasks Look at various Data aspects
  • 3. “ Security…But isn’t that the Admin’s Job?”
  • 4. Understanding Basic Security Restricting user access Disabling services and restricting service configuration Reducing the surface area of attack for new features
  • 5. Defense in Depth Always design your countermeasures to have at least two levels of defense This means that you put your defenses in serially rather than in parallel; attackers needs to overcome A and B – not A or B Use all the available countermeasures – technology, process, people Countermeasures and vulnerabilities are really two sides of the same coin
  • 6. Incidents Reported Industry Wide CERT/CC incident statistics 1988 through 2006 Incident: single security issue grouping together all impacts of that that issue Issue: disruption, DOS, loss of data, misuse, damage, loss of confidentiality Source: http://www.cert.org/stats/cert_stats.html 0 20000 40000 60000 80000 100000 120000 160000 180000 '88 '90 '92 '94 '96 '98 '00 '02
  • 7. Know Your Enemy Port Scanners Black Hat Community Sharing Brute Force pwd crackers Dictionary Based pwd crackers Network Sniffers De-compilers Debuggers Cracker Tools
  • 8. Mobile Device – Security Aspect
  • 9. Mobile – Entry Points Access to Device Access to Store-Data Access to wireless networks
  • 10. Mobile – Security Practices Risk Analysis Make Security policies Password Anti-Virus Software Encryption Need-to-know Data store
  • 11. Mobile – Security Practices Authentication Perimeter Security Encryption Data Encryption – Pocket PC (SQL CE – 128 bit encryption) App Encryption – .NET CF & High Encryption Pack Information Service Encryption Network Encryption Lock- Down Functionality
  • 13. Where is Customer’s Data Stored? Q: Where is the biggest data exposure risk? SQL
  • 14. Clients Documents Where do customers’ users keep their documents? User Profile Outlook, Sharepoint, Desktop, Temp, IE… per-machine data Search index, offline file cache, pagefile… Non-standard locations … ISV & in-house apps
  • 16. Encrypting File System Privacy of data that goes beyond access control Protect confidential data on laptops Configurable approach to data recovery Integrated with core operating system components Windows NT File System - NTFS Crypto API key management LSA security policy Transparent and very high performance
  • 17. What EFS is not… A way to protect local user credentials A way to protect data in transit (think IPSec) A way to protect business transaction documents (think Windows Rights Management)
  • 18. EFS File Encryption RNG Data decryption field generation (RSA) Data recovery field generation (RSA) DDF DRF User’s public key Recovery agent’s public key in recovery policy Randomly- generated file encryption key (FEK) File encryption (e.g. AES) A quick brown fox jumped... *#$fjda^j u539!3t t389E *&
  • 19. EFS File Decryption *#$fjda^j u539!3t t389E *& DDF A quick brown fox jumped... DDF extraction (RSA) File decryption (e.g. AES) File encryption key DDF is decrypted using the user’s private key to get the file encryption key DDF contains file encryption key encrypted under user’s public key User’s private key
  • 20. EFS File Recovery *#$fjda^j u539!3t t389E *& DRF A quick brown fox jumped... DRF extraction (RSA) File decryption (e.g. AES) File encryption key DRF is decrypted using the DRA ’s private key to get the file encryption key DRF contains file encryption key encrypted under DRA ’s public key DRA ’s private key
  • 21. EFS best practices: recovery No local Recovery Agents Prevents data comprise in “stolen laptop” scenario Prevents out-of-process data recovery… if encrypted data needs to be recovered, it should be an audited operation Have at least 2 Recovery Agents per domain Encrypt directories, not files Ensures that temp files created in process are also encrypted Prevents data recovery from free space on the file system Encrypt CSC cache (Offline Files) Protects temporary files that maybe written during application execution
  • 23. Windows Rights Management Services (RMS) Information protection technology that augments security strategies Users can easily safeguard sensitive information from unauthorized use Organizations can centrally manage internal information usage policies Uses RMS Server, RMS Client and RMS-enabled apps RMS protects information both online and offline, inside and outside of the firewall.
  • 24. RMS Publishing Flow (“online”) File Recipient File Author RM Server Author creates a file and defines a set of rights and rules. Application encrypts file and sends unsigned “publishing license” to RMS; Server signs and returns publishing license. Author distributes file. Application renders file and enforces rights. Recipient clicks file to open, the application calls to RMS which validates the user and the request and issues the “use license”. Database Server File Server
  • 25. If I could choose one, which one would I choose when? EFS – to encrypt all local data files automatically, under my domain account, to minimize risk of offline attack RMS – to share encrypted files easily among a group of people, or send them encrypted over the wire to any storage medium
  • 27. What are Principals? Principals Permissions Securables Server Role SQL Server Login SQL Server Windows Group Domain User Account Local User Account Windows User Database Role Application Role Group Database
  • 28. What are Securables? Principals Permissions Securables Files Registry Keys Server Schema Database Server Role SQL Server Login SQL Server Windows Group Domain User Account Local User Account Windows User Database Role Application Role Group Database
  • 29. What are Permissions? Principals Permissions Securables Files Registry Keys Server Schema Database CREATE ALTER DROP CONTROL CONNECT SELECT EXECUTE UPDATE DELETE INSERT TAKE OWNERSHIP VIEW DEFINITION BACKUP GRANT/REVOKE/DENY ACL Server Role SQL Server Login SQL Server Windows Group Domain User Account Local User Account Windows User Database Role Application Role Group Database
  • 30. Database Security Surface Area Reduction Authentication Mode Password Policies enforcement Administrative Privileges Catalog Security Encryption Auditing
  • 32. Summary Security is integral part of all software Maximize SQL Security to protect sensitive data Encryption is cool : Use it carefully though Understand the password policies of organization Block standard/un-used default ports Lastly, Understand all the entry points to your application
  • 34. Resources Encrypting File System in Windows XP and Windows Server 2003 http://www.microsoft.com/technet/prodtechnol/winxppro/deploy/cryptfs.mspx Best practices for the Encrypting File System http://support.microsoft.com/default.aspx?scid=kb;en-us;223316&sd=tech What's New in Security for Windows XP Professional and Windows XP Home Edition http://www.microsoft.com/technet/prodtechnol/winxppro/evaluate/xpsec.mspx
  • 35. Resources SQL Server : Security Blog http://blogs.msdn.com/lcris/ SQL Server Security and Protection http://www.microsoft.com/technet/prodtechnol/sql/2005/library/security.mspx What's New in Security for Windows XP http://www.microsoft.com/technet/prodtechnol/winxppro/evaluate/xpsec.mspx