Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This checklist helps you confirm that encryption is used appropriately in your environment. Use this checklist to periodically audit your use of encryption with the SQL Server Database Engine.
Database Level
... |
Description |
|
Have you evaluated encrypting data at rest using transparent data encryption? (TDE is available beginning with SQL Server 2008.) |
|
Do you use symmetric keys to encrypt sensitive data, and asymmetric keys or certificates to protect the symmetric keys? |
|
Do you have backups of certificates? |
|
Have you backed up your database to back up your symmetric and asymmetric keys? |
Table Column/Cell Level
... |
Description |
|
Is high-value and sensitive information (such as credit card numbers) stored using encryption? |
|
Have you selected the appropriate encryption algorithm for the data? |
Are you using hashes to store passwords and other secure information that doesn't need to be returned as plaintext? |
|
![]() |
Have you included symmetric encryption key recovery in your Disaster Recovery plan? |
![]() |
Are you using authenticators to add even more security to your encrypted data? |
Transparent Data Encryption
If you are using TDE, you must take care to adequately protect and back up the encryption keys.
... |
Description |
|
If the database encryption key is protected by using certificate, is the certificate backed up, and is the backup of the certificate and the private key file adequately protected? |
|
If the database encryption key is protected by using Extensible Key Management (EKM), is the asymmetric key on the Hardware Security Module adequately protected and backed up? |
|
Do you retain backups of old certificates and private keys? |
Other Security Checklists
Checklist: Enhancing the Security of Database Engine Connections
Checklist: Limiting Access to Data
Database Engine Security Checklist: Database Engine Security Configuration