Browse by Tags

Tagged Content List
  • Blog Post: DEK and the Log

    In my previous post I talked about DEK management and how it is stored in the database. In this post I will try to give an overview of how the database log file is encrypted by TDE and what are the implicataions of key rotations (DEK or encryptor changes) on the log file. TDE encrypts the database...
  • Blog Post: Database Encryption Key (DEK) management

    This post will talk about DEK, what it is and how it is securely stored and managed inside a database. Before enabling TDE a DEK must be created which is used to encrypt the contents of the database. It is a symmetric key and supported algorithms are AES with 128-bit, 192bit, or 256bit keys or 3 Key...
Page 1 of 1 (2 items)