SlideShare a Scribd company logo
1 of 19
John Magnabosco
Database Consultant/Solution Architect – SolutionAvenue
President/Co-Founder - Indianapolis Professional Association for SQL Server
Coordinator/Co-Founder – IndyTechFest

Visit my blog at:
         www.Simple-Talk.com
Download sample scripts and these slides at:
         www.johnmagnabosco.com
Today’s Presentation

         1.   Get To Know Your Challenges with Sensitive Data
         2.   What Is Sensitive Data?
         3.   Why Protect Sensitive Data?
         4.   How To Secure Sensitive Data
              With Code Demonstrations!
What is Sensitive Data?

         Government Assigned ID Data


         Biometric Data


         Medical Data and History
         Health Insurance Portability and Accountability Act (HIPAA)


         Student Education Data
         Federal Educational Rights and Privacy Act (FERPA)
What is Sensitive Data?

         Employment Data


         Communication Data
         Electronic Communications Privacy Act (ECPA)


         Financial Data
         Right to Financial Privacy Act (RFPA)


         Intellectual Property Data
Why Protect Sensitive Data?

         Guard Against Identity Theft and Fraud


         Ensure Privacy


         Comply with Regulatory Requirements


         Secure Competitive Advantage
Group Dynamics

        Birth Date + Birth Location + Name = Certified Copy of Birth Cert.


        Ancestor Name + Credit Card No. = Access To Credit Card Account


        Vacation Plans + Address = Stolen Personal Property from Home


        Pet Name + User Name = Password for E-Mail Account
How To Secure Sensitive Data

         Data Classification

         1.   Identify classes of sensitivity
              •   Public, Internal, Confidential, Top Secret
         2.   Define security policies according to these classes*
              •   This will likely be defined by CIO or ISO rather than DBA
         3.   Assign a classification to each column in the tables
              •   Document with Extended Properties
         4.   Assign users/roles accordingly
              •   Access to database objects, views and tables
How To Secure Sensitive Data
  Capturing Sensitivity Classification with Extended Properties




       Demonstration…
How To Secure Sensitive Data

         Data Handling Policies

         1.   Consider what data can be printed
              •   Internal documents, bulk mailing, individual mailing
         2.   Consider what data can be displayed on screen
              •   Based upon sensitivity classification
         3.   Consider what data can be stored externally from db
              •   Excel spreadsheets, files on disk/thumb drive
         4.   Determine display alternatives for sensitive data
              •   Partial display, no display, disclosed upon entry of pass code
Sample Nightmare
• 12/31/2008: A State University
     Publishes names and SSN of 18,000 current/former students on the Internet.
•12/23/2008: A Popular Soda Company
     Missing portable device containing employee names and SSN.
• 12/23/2008: An Internet Telephone Provider
     A vendor stored customer credit card, bank account, names, addresses on Google Notebook.
• 12/16/2008: A Large Investment Brokerage Firm
     Stolen laptop containing SSN, names and addresses of clients.
• 12/15/2008: A State Department of Revenue
     Names, addresses and SSN of individuals exposed in mailing error.
• 12/04/2008: A State University
     A spreadsheet containing names, addresses and SSN of students published on the Internet.
• 12/02/2008: A State Agency of Workforce
     Names and SSN of 250,000 found on the Internet through search engine.
 These items were provided through the OSF Data Loss RSS Feed: http://datalossdb.org/latest_incidents.rss
How To Secure Sensitive Data

         Data Backup Storage

         1.   Store backup media in a secure location
              •   Offsite storage, room with limited access, fireproof
         2.   Store encryption key backups separately
              •   Not on same media, not in same location
         3.   Consider utilizing Transparent Data Encryption
              •   This feature encrypts the physical data files
         4.   Store data no longer than required
              •   Establish a retention schedule. Destroy items on schedule.
How To Secure Sensitive Data

         Encryption

         1.   Consider utilizing Cell-Level Encryption
              •   Provides granular protection of data for each column
         2.   Consider utilizing Transparent Data Encryption
              •   Protects data files, transaction logs and backup files
         3.   Manage key lifecycles
              •   Encryption keys become weak over time.
         4.   Store key backups separate from db backups
              •   The db cannot be decrypted without these keys.
How To Secure Sensitive Data
  Using Cell-Level Encryption and Transparent Data Encryption




       Demonstration…
How To Secure Sensitive Data

         Other Methods

         1.   HashBytes() method
              •   Encryption without the messy decryption
         2.   Masking data
              •   Replace part of the data with ‘X’ or other character
         3.   Coding data
              •   Use a number to represent data
         4.   Don’t store more data than you need
              •   Why increase the cost of storing data unnecessarily
How To Secure Sensitive Data
  Using Other Data Protection Methods




       Demonstration…
In Summary

       1.    Define Sensitive Data
       2.    Understand Why Sensitive Data Must Be Protected
       3.    Classify Data
       4.    Define Data Handling Policies
       5.    Include Back Up Strategies in Protecting Sensitive Data
       6.    Consider Encryption and Other Protection Methods
Questions…
…and in some cases, answers.
Additional Resources
 Data Loss Resources:
      OSF Data Loss RSS Feed
        http://datalossdb.org/latest_incidents.rss

 Additional TDE Resources:
     MSDN: Understanding TDE (Article)
        http://msdn.microsoft.com/en-us/library/bb934049.aspx
     My Blog: Check out my series on TDE
        http://www.simple-talk.com/community/blogs/johnm/default.aspx

 Additional General Encryption Resources:
       MSDN: SQL Server Encryption
         http://msdn.microsoft.com/en-us/library/bb510663.aspx
 Have More Questions?
      My E-Mail: john_magnabosco@live.com

More Related Content

What's hot

Information retrieval s
Information retrieval sInformation retrieval s
Information retrieval ssilambu111
 
Concepts of Data Bases
Concepts of Data BasesConcepts of Data Bases
Concepts of Data BasesNetworking
 
Information retrieval system!
Information retrieval system!Information retrieval system!
Information retrieval system!Jane Garay
 
CURRENT AND FUTURE TRENDS IN DBMS
CURRENT AND FUTURE TRENDS IN DBMSCURRENT AND FUTURE TRENDS IN DBMS
CURRENT AND FUTURE TRENDS IN DBMSGayathri P
 
Paul2 ecn 2012
Paul2 ecn 2012Paul2 ecn 2012
Paul2 ecn 2012ECNOfficer
 
Digital Forensics Overview
Digital Forensics OverviewDigital Forensics Overview
Digital Forensics OverviewMathew Shelby
 
INFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.LINFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.Lanujessy
 
GDPR Datatags DANS Oct 2017
GDPR Datatags DANS Oct 2017GDPR Datatags DANS Oct 2017
GDPR Datatags DANS Oct 2017pkdoorn
 
E discovery mallareddy 20160213
E discovery mallareddy 20160213E discovery mallareddy 20160213
E discovery mallareddy 20160213nullowaspmumbai
 
Bioinformatioc: Information Retrieval - II
Bioinformatioc: Information Retrieval - IIBioinformatioc: Information Retrieval - II
Bioinformatioc: Information Retrieval - IIDr. Rupak Chakravarty
 
INFORMATION RETRIEVAL ‎AND DISSEMINATION
INFORMATION RETRIEVAL ‎AND DISSEMINATIONINFORMATION RETRIEVAL ‎AND DISSEMINATION
INFORMATION RETRIEVAL ‎AND DISSEMINATIONLibcorpio
 
Lect 08 computer security and privacy 2 4 q
Lect 08 computer security and privacy 2 4 qLect 08 computer security and privacy 2 4 q
Lect 08 computer security and privacy 2 4 qRamy Eltarras
 
Lecture 11 Unstructured Data and the Data Warehouse
Lecture 11 Unstructured Data and the Data WarehouseLecture 11 Unstructured Data and the Data Warehouse
Lecture 11 Unstructured Data and the Data Warehousephanleson
 
Information storage and retrieval
Information storage and  retrievalInformation storage and  retrieval
Information storage and retrievalDr. Utpal Das
 
Privacy and security 815
Privacy and security 815Privacy and security 815
Privacy and security 815Rachel
 
Information Storage and Retrieval system (ISRS)
Information Storage and Retrieval system (ISRS)Information Storage and Retrieval system (ISRS)
Information Storage and Retrieval system (ISRS)Sumit Kumar Gupta
 
Multimedia Database
Multimedia DatabaseMultimedia Database
Multimedia Databaseshaikh2016
 

What's hot (20)

Information retrieval s
Information retrieval sInformation retrieval s
Information retrieval s
 
Concepts of Data Bases
Concepts of Data BasesConcepts of Data Bases
Concepts of Data Bases
 
Information retrieval system!
Information retrieval system!Information retrieval system!
Information retrieval system!
 
CURRENT AND FUTURE TRENDS IN DBMS
CURRENT AND FUTURE TRENDS IN DBMSCURRENT AND FUTURE TRENDS IN DBMS
CURRENT AND FUTURE TRENDS IN DBMS
 
Paul2 ecn 2012
Paul2 ecn 2012Paul2 ecn 2012
Paul2 ecn 2012
 
Digital Forensics Overview
Digital Forensics OverviewDigital Forensics Overview
Digital Forensics Overview
 
INFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.LINFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.L
 
GDPR Datatags DANS Oct 2017
GDPR Datatags DANS Oct 2017GDPR Datatags DANS Oct 2017
GDPR Datatags DANS Oct 2017
 
E discovery mallareddy 20160213
E discovery mallareddy 20160213E discovery mallareddy 20160213
E discovery mallareddy 20160213
 
Multimedia database
Multimedia databaseMultimedia database
Multimedia database
 
Bioinformatioc: Information Retrieval - II
Bioinformatioc: Information Retrieval - IIBioinformatioc: Information Retrieval - II
Bioinformatioc: Information Retrieval - II
 
INFORMATION RETRIEVAL ‎AND DISSEMINATION
INFORMATION RETRIEVAL ‎AND DISSEMINATIONINFORMATION RETRIEVAL ‎AND DISSEMINATION
INFORMATION RETRIEVAL ‎AND DISSEMINATION
 
Lect 08 computer security and privacy 2 4 q
Lect 08 computer security and privacy 2 4 qLect 08 computer security and privacy 2 4 q
Lect 08 computer security and privacy 2 4 q
 
Lecture 11 Unstructured Data and the Data Warehouse
Lecture 11 Unstructured Data and the Data WarehouseLecture 11 Unstructured Data and the Data Warehouse
Lecture 11 Unstructured Data and the Data Warehouse
 
Unit 2
Unit 2Unit 2
Unit 2
 
Information storage and retrieval
Information storage and  retrievalInformation storage and  retrieval
Information storage and retrieval
 
Privacy and security 815
Privacy and security 815Privacy and security 815
Privacy and security 815
 
Metadata lecture 1, intro
Metadata lecture 1, introMetadata lecture 1, intro
Metadata lecture 1, intro
 
Information Storage and Retrieval system (ISRS)
Information Storage and Retrieval system (ISRS)Information Storage and Retrieval system (ISRS)
Information Storage and Retrieval system (ISRS)
 
Multimedia Database
Multimedia DatabaseMultimedia Database
Multimedia Database
 

Similar to Sensitive data - SQL Saturday Tampa

Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data miningharithavijay94
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionNicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss PreventionNicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionNicholas Davis
 
DCSF19 Containerized Databases for Enterprise Applications
DCSF19 Containerized Databases for Enterprise ApplicationsDCSF19 Containerized Databases for Enterprise Applications
DCSF19 Containerized Databases for Enterprise ApplicationsDocker, Inc.
 
20170222 ku-librarians勉強会 #211 :海外研修報告:英国大学図書館を北から南へ巡る旅
20170222 ku-librarians勉強会 #211 :海外研修報告:英国大学図書館を北から南へ巡る旅20170222 ku-librarians勉強会 #211 :海外研修報告:英国大学図書館を北から南へ巡る旅
20170222 ku-librarians勉強会 #211 :海外研修報告:英国大学図書館を北から南へ巡る旅kulibrarians
 
Trust in a Digital World
Trust in a Digital WorldTrust in a Digital World
Trust in a Digital Worlditnewsafrica
 
Introduction to Research Data Management for postgraduate students
Introduction to Research Data Management for postgraduate studentsIntroduction to Research Data Management for postgraduate students
Introduction to Research Data Management for postgraduate studentsMarieke Guy
 
BUS105Business Information SystemsWorkshop Week 3.docx
BUS105Business Information SystemsWorkshop Week 3.docxBUS105Business Information SystemsWorkshop Week 3.docx
BUS105Business Information SystemsWorkshop Week 3.docxjasoninnes20
 
Research Data Management for Qualitative Researchers
Research Data Management for Qualitative ResearchersResearch Data Management for Qualitative Researchers
Research Data Management for Qualitative ResearchersCelia Emmelhainz
 
Database Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantDatabase Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantKamruzzamansohel2
 
Exploring Data Privacy - SQL Saturday Louisville 2011
Exploring Data Privacy - SQL Saturday Louisville 2011Exploring Data Privacy - SQL Saturday Louisville 2011
Exploring Data Privacy - SQL Saturday Louisville 2011John Magnabosco
 
Conquering Chaos in the Age of Networked Science: Research Data Management
Conquering Chaos in the Age of Networked Science: Research Data ManagementConquering Chaos in the Age of Networked Science: Research Data Management
Conquering Chaos in the Age of Networked Science: Research Data ManagementKathryn Houk
 
Data security in clouds
Data security in cloudsData security in clouds
Data security in cloudsimVishhh
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletionsnehal1010
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issuesErnest Staats
 
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTSTECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTSAnnelore van der Lint
 
Managing data throughout the research lifecycle
Managing data throughout the research lifecycleManaging data throughout the research lifecycle
Managing data throughout the research lifecycleMarieke Guy
 

Similar to Sensitive data - SQL Saturday Tampa (20)

Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data mining
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
Preparing research data for sharing
Preparing research data for sharingPreparing research data for sharing
Preparing research data for sharing
 
DCSF19 Containerized Databases for Enterprise Applications
DCSF19 Containerized Databases for Enterprise ApplicationsDCSF19 Containerized Databases for Enterprise Applications
DCSF19 Containerized Databases for Enterprise Applications
 
20170222 ku-librarians勉強会 #211 :海外研修報告:英国大学図書館を北から南へ巡る旅
20170222 ku-librarians勉強会 #211 :海外研修報告:英国大学図書館を北から南へ巡る旅20170222 ku-librarians勉強会 #211 :海外研修報告:英国大学図書館を北から南へ巡る旅
20170222 ku-librarians勉強会 #211 :海外研修報告:英国大学図書館を北から南へ巡る旅
 
Trust in a Digital World
Trust in a Digital WorldTrust in a Digital World
Trust in a Digital World
 
Introduction to Research Data Management for postgraduate students
Introduction to Research Data Management for postgraduate studentsIntroduction to Research Data Management for postgraduate students
Introduction to Research Data Management for postgraduate students
 
BUS105Business Information SystemsWorkshop Week 3.docx
BUS105Business Information SystemsWorkshop Week 3.docxBUS105Business Information SystemsWorkshop Week 3.docx
BUS105Business Information SystemsWorkshop Week 3.docx
 
Research Data Management for Qualitative Researchers
Research Data Management for Qualitative ResearchersResearch Data Management for Qualitative Researchers
Research Data Management for Qualitative Researchers
 
Database Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantDatabase Security Presentation Why database Security is important
Database Security Presentation Why database Security is important
 
Exploring Data Privacy - SQL Saturday Louisville 2011
Exploring Data Privacy - SQL Saturday Louisville 2011Exploring Data Privacy - SQL Saturday Louisville 2011
Exploring Data Privacy - SQL Saturday Louisville 2011
 
Conquering Chaos in the Age of Networked Science: Research Data Management
Conquering Chaos in the Age of Networked Science: Research Data ManagementConquering Chaos in the Age of Networked Science: Research Data Management
Conquering Chaos in the Age of Networked Science: Research Data Management
 
Data security in clouds
Data security in cloudsData security in clouds
Data security in clouds
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletion
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
Cyber security
Cyber securityCyber security
Cyber security
 
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTSTECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
 
Managing data throughout the research lifecycle
Managing data throughout the research lifecycleManaging data throughout the research lifecycle
Managing data throughout the research lifecycle
 

Recently uploaded

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Sensitive data - SQL Saturday Tampa

  • 1. John Magnabosco Database Consultant/Solution Architect – SolutionAvenue President/Co-Founder - Indianapolis Professional Association for SQL Server Coordinator/Co-Founder – IndyTechFest Visit my blog at: www.Simple-Talk.com Download sample scripts and these slides at: www.johnmagnabosco.com
  • 2. Today’s Presentation 1. Get To Know Your Challenges with Sensitive Data 2. What Is Sensitive Data? 3. Why Protect Sensitive Data? 4. How To Secure Sensitive Data With Code Demonstrations!
  • 3. What is Sensitive Data? Government Assigned ID Data Biometric Data Medical Data and History Health Insurance Portability and Accountability Act (HIPAA) Student Education Data Federal Educational Rights and Privacy Act (FERPA)
  • 4. What is Sensitive Data? Employment Data Communication Data Electronic Communications Privacy Act (ECPA) Financial Data Right to Financial Privacy Act (RFPA) Intellectual Property Data
  • 5. Why Protect Sensitive Data? Guard Against Identity Theft and Fraud Ensure Privacy Comply with Regulatory Requirements Secure Competitive Advantage
  • 6. Group Dynamics Birth Date + Birth Location + Name = Certified Copy of Birth Cert. Ancestor Name + Credit Card No. = Access To Credit Card Account Vacation Plans + Address = Stolen Personal Property from Home Pet Name + User Name = Password for E-Mail Account
  • 7. How To Secure Sensitive Data Data Classification 1. Identify classes of sensitivity • Public, Internal, Confidential, Top Secret 2. Define security policies according to these classes* • This will likely be defined by CIO or ISO rather than DBA 3. Assign a classification to each column in the tables • Document with Extended Properties 4. Assign users/roles accordingly • Access to database objects, views and tables
  • 8. How To Secure Sensitive Data Capturing Sensitivity Classification with Extended Properties Demonstration…
  • 9. How To Secure Sensitive Data Data Handling Policies 1. Consider what data can be printed • Internal documents, bulk mailing, individual mailing 2. Consider what data can be displayed on screen • Based upon sensitivity classification 3. Consider what data can be stored externally from db • Excel spreadsheets, files on disk/thumb drive 4. Determine display alternatives for sensitive data • Partial display, no display, disclosed upon entry of pass code
  • 10. Sample Nightmare • 12/31/2008: A State University Publishes names and SSN of 18,000 current/former students on the Internet. •12/23/2008: A Popular Soda Company Missing portable device containing employee names and SSN. • 12/23/2008: An Internet Telephone Provider A vendor stored customer credit card, bank account, names, addresses on Google Notebook. • 12/16/2008: A Large Investment Brokerage Firm Stolen laptop containing SSN, names and addresses of clients. • 12/15/2008: A State Department of Revenue Names, addresses and SSN of individuals exposed in mailing error. • 12/04/2008: A State University A spreadsheet containing names, addresses and SSN of students published on the Internet. • 12/02/2008: A State Agency of Workforce Names and SSN of 250,000 found on the Internet through search engine. These items were provided through the OSF Data Loss RSS Feed: http://datalossdb.org/latest_incidents.rss
  • 11. How To Secure Sensitive Data Data Backup Storage 1. Store backup media in a secure location • Offsite storage, room with limited access, fireproof 2. Store encryption key backups separately • Not on same media, not in same location 3. Consider utilizing Transparent Data Encryption • This feature encrypts the physical data files 4. Store data no longer than required • Establish a retention schedule. Destroy items on schedule.
  • 12.
  • 13. How To Secure Sensitive Data Encryption 1. Consider utilizing Cell-Level Encryption • Provides granular protection of data for each column 2. Consider utilizing Transparent Data Encryption • Protects data files, transaction logs and backup files 3. Manage key lifecycles • Encryption keys become weak over time. 4. Store key backups separate from db backups • The db cannot be decrypted without these keys.
  • 14. How To Secure Sensitive Data Using Cell-Level Encryption and Transparent Data Encryption Demonstration…
  • 15. How To Secure Sensitive Data Other Methods 1. HashBytes() method • Encryption without the messy decryption 2. Masking data • Replace part of the data with ‘X’ or other character 3. Coding data • Use a number to represent data 4. Don’t store more data than you need • Why increase the cost of storing data unnecessarily
  • 16. How To Secure Sensitive Data Using Other Data Protection Methods Demonstration…
  • 17. In Summary 1. Define Sensitive Data 2. Understand Why Sensitive Data Must Be Protected 3. Classify Data 4. Define Data Handling Policies 5. Include Back Up Strategies in Protecting Sensitive Data 6. Consider Encryption and Other Protection Methods
  • 18. Questions… …and in some cases, answers.
  • 19. Additional Resources Data Loss Resources: OSF Data Loss RSS Feed http://datalossdb.org/latest_incidents.rss Additional TDE Resources: MSDN: Understanding TDE (Article) http://msdn.microsoft.com/en-us/library/bb934049.aspx My Blog: Check out my series on TDE http://www.simple-talk.com/community/blogs/johnm/default.aspx Additional General Encryption Resources: MSDN: SQL Server Encryption http://msdn.microsoft.com/en-us/library/bb510663.aspx Have More Questions? My E-Mail: john_magnabosco@live.com