SlideShare a Scribd company logo
1 of 38
Optimizing
Protected
Indexes
aka: “Indexing” encrypted data
Comic from Dilbert.com
Agenda
• Scenarios of data exposure
• Data in transit vs. Data at rest
• Discuss personal experience
• Hash or Encryption – How to choose?
• Demo #1
• Discuss how to improve
• Demo #2
• Final summary and questions
http://reedbookmanreunion.com/images/agenda.jpg
50 million users
may have been compromised
Name, email, address, “encrypted” passwords
4.7 million SSN
3.3 million bank account #s
“While encryption of data at rest is an effective defense-in-depth
technique, encryption is not currently required for FTI
(Federal Tax Information) while it resides on a system (e.g., in files
or in a database) that is dedicated to receiving, processing, storing
or transmitting FTI, is configured in accordance with the IRS
Safeguards Computer Security Evaluation Matrix (SCSEM)
recommendations and is physically secure restricted area behind
two locked barriers. This type of encryption is being evaluated by
the IRS as a potential policy update in the next revision of the
Publication 1075.”

Data at rest is not required to be encrypted
http://www.irs.gov/uac/Encryption-Requirements-of-IRS-Publication-1075
94 million credit cards
Data in Transit
Data at Rest
http://www.petapixel.com/assets/uploads/2009/12/Storybook-Wolf-by-Jose-Lu-0011.jpg
Change is coming
 Data at object level had to be protected

 Had to be able to decrypt the value
 No change to existing application code, SQL code ok
 Minimal Impact on performance

http://shawnram.files.wordpress.com/2010/10/criteria1.jpg
http://www.thephatstartup.com/wp-content/uploads/2012/08/dont-worry-i-got-this.jpg
What method?
Does:
• Encrypt the MDF and LDF files via symmetric key
• Encrypt files and trans log for log shipped / mirrored
• Affect performance since tempdb is encrypted too

Does not:
•
•
•
•
•
•

encrypt data at the object level.
support instant file initialization for database files.
interact well with backup compression.
encrypt read only filegroups.
encrypt databases used in replication topologies.
encrypt filestream data.
 Data at object level had to be protected

 Had to be able to decrypt the value
 No change to existing application code, SQL code ok
 Minimal Impact on performance

http://shawnram.files.wordpress.com/2010/10/criteria1.jpg
HASH!!
http://www.thesouthinmymouth.com/wp-content/uploads/2012/01/corned-beef-hash.jpg
Salt your Hashes

http://www.f1online.pro/en/image-details/4832529.html
http://kingdombard.files.wordpress.com/2010/06/one_way_by_cellogirl19.jpg
Collisions
 Data at object level had to be protected

 Had to be able to decrypt the value
 No change to existing application code, SQL code ok
 Minimal Impact on performance

http://shawnram.files.wordpress.com/2010/10/criteria1.jpg
Encryption
http://www.swiss-banking-antiques.com/images/bbposte60mmperspective-750.png

http://cdn.zmescience.com/wp-content/uploads/2012/12/fresh-sliced-bread.jpg
DEMO
 Data at object level had to be protected

 Had to be able to decrypt the value
 No change to existing application code, SQL code ok
 Minimal Impact on performance

http://shawnram.files.wordpress.com/2010/10/criteria1.jpg
Options?

http://www.miamism.com/wp-content/uploads/m/blogs/miamism/options.jpg
Hash Grouping
Generate a value
From a hash algorithm
and store only the end
result value.

http://kennybriscoe.com/wp-content/uploads/2011/02/lightbulb-idea.jpg
 Data at object level had to be protected

 Had to be able to decrypt the value
 No change to existing application code, SQL code ok
 Minimal Impact on performance

http://shawnram.files.wordpress.com/2010/10/criteria1.jpg
SUCCESS!
New GPU systems
crack 14 character passwords
in about 6 minutes

Potential breaking times of various Hash Algorithms:
• SHA1: 63G / sec
• LM: 20G / sec
• Bcrypt: 71k /sec
*Not been able to find stats for AES_256 (SQL Encryption)
because no one is really bothering to try
http://www.club-3d.com/tl_files/club3d/uploads/en/content/Technology/AMD/CrossFireX/3waycrossfire.png
http://imgix.8tracks.com/mix_covers/000/593/175/94743.original.jpg?fm=jpg&q=65&sharp=15&vib=10&w=521&h=521&fit=crop
@CBELLDBA

Chris@WaterOxConsulting.com

www.WaterOxConsulting.com

Image by: Master isolated images on www.freedigitalphotos.net

More Related Content

What's hot

Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
Sagar Rahurkar
 
Anti forensic
Anti forensicAnti forensic
Anti forensic
Milap Oza
 

What's hot (17)

Digital Forensics Projects Assistance
Digital Forensics Projects Assistance Digital Forensics Projects Assistance
Digital Forensics Projects Assistance
 
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
 
Five steps to secure big data
Five steps to secure big dataFive steps to secure big data
Five steps to secure big data
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
Digital Forensics Workshop
Digital Forensics WorkshopDigital Forensics Workshop
Digital Forensics Workshop
 
Digital Anti-Forensics: Emerging trends in data transformation techniques
Digital Anti-Forensics: Emerging trends in data transformation techniquesDigital Anti-Forensics: Emerging trends in data transformation techniques
Digital Anti-Forensics: Emerging trends in data transformation techniques
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Anti forensic
Anti forensicAnti forensic
Anti forensic
 
Deep Web and Digital Investigations
Deep Web and Digital Investigations Deep Web and Digital Investigations
Deep Web and Digital Investigations
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Dama - Protecting Sensitive Data on a Database
Dama - Protecting Sensitive Data on a DatabaseDama - Protecting Sensitive Data on a Database
Dama - Protecting Sensitive Data on a Database
 
Digital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collideDigital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collide
 
Crowdsourcing Speech Data Science and AI
Crowdsourcing Speech Data Science and AI Crowdsourcing Speech Data Science and AI
Crowdsourcing Speech Data Science and AI
 
O365Con18 - Threat Modeling for SharePoint - Ivan Vagunin
O365Con18 - Threat Modeling for SharePoint - Ivan VaguninO365Con18 - Threat Modeling for SharePoint - Ivan Vagunin
O365Con18 - Threat Modeling for SharePoint - Ivan Vagunin
 
Opentext Decisiv
Opentext DecisivOpentext Decisiv
Opentext Decisiv
 
Sujit
SujitSujit
Sujit
 

Similar to Optimizing Protected Indexes

Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
MongoDB
 

Similar to Optimizing Protected Indexes (20)

Content Disarm Reconstruction & Cyber Kill Chain
Content Disarm Reconstruction & Cyber Kill ChainContent Disarm Reconstruction & Cyber Kill Chain
Content Disarm Reconstruction & Cyber Kill Chain
 
Content Disarm Reconstruction and Cyber Kill Chain - Muhammad Sahputra
Content Disarm Reconstruction and Cyber Kill Chain - Muhammad SahputraContent Disarm Reconstruction and Cyber Kill Chain - Muhammad Sahputra
Content Disarm Reconstruction and Cyber Kill Chain - Muhammad Sahputra
 
Trust in a Digital World
Trust in a Digital WorldTrust in a Digital World
Trust in a Digital World
 
Data base system.pptx
Data base system.pptxData base system.pptx
Data base system.pptx
 
Web & Cloud Security in the real world
Web & Cloud Security in the real worldWeb & Cloud Security in the real world
Web & Cloud Security in the real world
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Apache Spark vs Apache Spark: An On-Prem Comparison of Databricks and Open-So...
Apache Spark vs Apache Spark: An On-Prem Comparison of Databricks and Open-So...Apache Spark vs Apache Spark: An On-Prem Comparison of Databricks and Open-So...
Apache Spark vs Apache Spark: An On-Prem Comparison of Databricks and Open-So...
 
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Asug84339   how to secure privacy data in a hybrid s4 hana landscapeAsug84339   how to secure privacy data in a hybrid s4 hana landscape
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
 
Mitigating One Million Security Threats With Kafka and Spark With Arun Janart...
Mitigating One Million Security Threats With Kafka and Spark With Arun Janart...Mitigating One Million Security Threats With Kafka and Spark With Arun Janart...
Mitigating One Million Security Threats With Kafka and Spark With Arun Janart...
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
 
Essential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field SecurityEssential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field Security
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Hadoop and Big Data Security
Hadoop and Big Data SecurityHadoop and Big Data Security
Hadoop and Big Data Security
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
 
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
 
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopBeware the Firewall My Son: The Workshop
Beware the Firewall My Son: The Workshop
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Buy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdfBuy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 

Optimizing Protected Indexes