Security News > 2021 > February > Database encryption: Protecting the crown jewels

Database encryption: Protecting the crown jewels
2021-02-22 06:30

They can also copy the entire database - including files that contain many of the corporate crown jewels.

There are a variety of technologies for database encryption.

Transparent Data Encryption, usually provided as an option from the database vendor, is commonly used.

Data masking is a further technology that is aimed at hiding sensitive information from database authorized users.

To encrypt all your databases, you now have to purchase, deploy, manage and maintain multiple different database security products.

Databases, under the covers, are just a bunch of files, so if we just encrypt all the underlying files then the entire database is naturally secure against both our hacker and the rogue admin stealing them.


News URL

http://feedproxy.google.com/~r/HelpNetSecurity/~3/fptvwZ2TGhE/