Skip to content

Latest commit

 

History

History
28 lines (23 loc) · 2.55 KB

tde-protector-encrypted.md

File metadata and controls

28 lines (23 loc) · 2.55 KB

CloudSploit

AZURE / SQL Server / TDE Protector Encrypted

Quick Info

Plugin Title TDE Protector Encrypted
Cloud AZURE
Category SQL Server
Description Ensures SQL Server TDE protector is encrypted with BYOK (Bring Your Own Key)
More Info Enabling BYOK in the TDE protector allows for greater control and transparency, as well as increasing security by having full control of the encryption keys.
AZURE Link https://docs.microsoft.com/en-us/azure/sql-database/transparent-data-encryption-byok-azure-sql
Recommended Action Ensure that a BYOK key is set for the Transparent Data Encryption of each SQL Server.

Detailed Remediation Steps

  1. Log in to the Microsoft Azure Management Console.
  2. Select the "Search resources, services, and docs" option at the top and search for "SQL servers".
  3. On the "SQL server" page, select the SQL server that needs to be examined.
  4. On the selected "SQL server" page, scroll down the left navigation panel and select "Transparent data encryption" under the "Security".
  5. On the "Transparent data encryption" page, if "Transparent data encryption" is set to "Service-managed key" then the selected "SQL server TDE protector" is not encrypted with BYOK (Bring Your Own Key).
  6. To ensure that a custom BYOK is used, select "Customer-managed key" for "Transparent data encryption".
  7. Under "Key selection method" choose "Select a key" and click on "Change key" under "Key".
  8. In the "Select a key" page, select the "Key vault" under "Key store type" and then select desired "Key" and "version" accordingly. Click on "Select" button at the bottom to proceed.
  9. Click on the "Save" button at the top to make the necessary changes.
  10. Reepat steps number 3 - 9 to ensure that a BYOK key is set for the Transparent Data Encryption of each SQL Server.