![]() ![]() Well, what you really need is a parachute. It’s like jumping off an aircraft high up in the clouds and hoping your trusty motorcycle helmet will save you. The most common attacks in the cloud, the ones that will compromise your data and take down your business, are actually network and logical attacks at the SQL layer. ![]() So the first issue with TDE is that this threat model is obsolete in the cloud – no one tries to steal your hard disks from the data-center anymore. Not unless it’s Tom Cruise and it’s the Mission Impossible movie. This made sense in the pre-cloud era where the database server would be on a server rack down the hallway but no hacker attempts to steal your hard drives from your inside data-center. Specifically, the threat model it protects against is when someone might pull out your server’s hard drive, read the database file and the information within the database file. TDE or Transparent Data Encryption encrypts the actual database file that’s resident on the database server’s filesystem. In the cloud however, this is a tremendous security nightmare because you’re forced to trust (from a security perspective) people and infrastructure that you really cannot or should not.īut before we continue, let’s talk about one thing … TDE is not very useful in the cloud This made sense 10 years ago when the border with the outside world was very clear and ownership of data, databases, servers and administrators all meant the same thing. Traditional security approaches often involve securing a myriad pieces of infrastructure and people who go into a building, deploying and managing your server or cloud application. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |