{"id":14451,"date":"2015-11-18T10:00:00","date_gmt":"2015-11-18T18:00:00","guid":{"rendered":"https:\/\/blogs.technet.microsoft.com\/dataplatforminsider\/2015\/11\/18\/always-encrypted-in-sql-server-azure-sql-database\/"},"modified":"2024-01-30T10:23:51","modified_gmt":"2024-01-30T18:23:51","slug":"always-encrypted-in-sql-server-azure-sql-database","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/11\/18\/always-encrypted-in-sql-server-azure-sql-database\/","title":{"rendered":"Always Encrypted in SQL Server & Azure SQL Database"},"content":{"rendered":"\n
This post was authored by Joseph Sirosh<\/a>, Corporate Vice President of the Data Group at Microsoft.<\/em><\/p>\n\n\n\n Most data breaches involve the theft of critical data such as social security or credit card numbers. What if you could store these sensitive data elements encrypted in your database, allowing decryption only at the point of use by people or applications that need to access or process that data? For example, an admitting nurse at a doctor\u2019s office may have a business need to access a patient\u2019s unencrypted social security number, but that data may not need to be visible anywhere else in the system.<\/p>\n\n\n\n With the introduction of the Always Encrypted capability in SQL Server 2016 <\/a>and Azure SQL Database<\/a> you can now do exactly that. Your database data remains encrypted at all times during computations and query processing. This industry-first technology was developed jointly by Microsoft Research and the Data Group to offer our customers unparalleled data security.<\/p>\n\n\n\n We have enhanced the SQL Server client drivers to work in conjunction with SQL Server to decrypt and encrypt data at the point of use, requiring only minimal modifications to your applications. Encryption keys are managed outside of the database for maximum safety and separation of duties. Only authorized users with access to decryption keys can see unencrypted data while using your applications.<\/p>\n\n\n\n As illustrated in the schematic below, the client driver encrypts the data on the client side using the keys only the client knows before sending encrypted data to the database. When the client application retrieves data from an encrypted column, the driver transparently decrypts the data before returning it to the application.<\/p>\n\n\n\n <\/p>\n\n\n\n The security guarantees provided by Always Encrypted represent a shift in the industry and will help customers protect critical data in their on-premises, hosted and cloud databases.<\/p>\n\n\n\n Take the example of Financial Fabric<\/a>, an ISV that offers the \u2018DataHub\u2019 aggregation and analytics service to hedge funds. They are an early adopter and beneficiary, relying on Always Encrypted to help protect sensitive data about their investors and their holdings, including investors\u2019 names, addresses and their assets. Subhra Bose, the CEO of Financial Fabric, has referred to Always Encrypted as nothing less than a \u201cgame changer for the financial industry.\u201d<\/p>\n\n\n\n To simplify the adoption of Always Encrypted, SQL Server Management Studio now includes the new Column Encryption Wizard. With just a few clicks this wizard will:<\/p>\n\n\n\n For more information on Always Encrypted including how to get started today, be sure to check out these additional resources:<\/p>\n\n\n\n At Microsoft we are working hard to keep our customers\u2019 data safe, both on premises and in the cloud. Always Encrypted in SQL Server and Azure SQL DB represents an important step in that journey. We hope many of you give it a spin and share your thoughts and experiences with us.<\/p>\n\n\n\n
<\/figure>\n\n\n\n\n
\n