1.0 Introduction
This article describes the best practices for Microsoft SQL Transparent Data Encryption (TDE) operations integration.
2.0 MSSQL TDE Best Practices
It is recommended to follow the MSSQL TDE best practices.
Always take a full database backup before TDE implementation.
Use a separate service account for the sysadmin DB credentials for key rotation.
Use a nomenclature for the TDE master keys such as
hostname_dbName
to easily identify the key associated with the database instance running on a specific host.It is strongly advised not to delete the old master keys from the Fortanix-Data-Security-Manager (DSM) as they are required to restore the database from old backups. You can always disable the old keys if you do not want anyone to access them.
2.1 Enable Startup Trace Flag
2.1.1 Trace flag 15025
Microsoft introduced a startup trace flag (TF) 15025 to disable the HSM access that is required for a newly created virtual log file (VLF). This allows high-volume customer workloads to continue without interruption. Once this trace flag is enabled, SQL Server that uses EKM for encryption and key generation doesn't contact HSM during the creation or rotation of VLF.
This trace flag applies to SQL Server 2019 (15.x) CU 19, SQL Server 2022 (16.x) CU 1, and later.
Hence, we recommend our customers upgrade the MSSQL Always On database to 2019 CU19 or 2022 CU1 and turn on the trace flag (TF) 15025.
NOTE
To enable this TF, please refer to the steps in the following URL:
2.1.2 Trace flag 5013
Microsoft also has a trace flag (TF) 5013 that is undocumented and works with SQL Server 2017 and above and 2019 CU 19 below. In a high transitional database, SQL always tries to get a key from Fortanix DSM. If there is a connection problem between the SQL database and Fortanix DSM, this flag uses the cache key to avoid the database from crashing.
3.0 Troubleshooting
If your database has been encrypted previously, you may see errors at this point. If you are asked to take a pending log backup, then take the backup using the following methods:
Using command:
BACKUP LOG employee TO DISK = 'C:\employee.TRN' GO
This will create a transaction log backup of the employee database and write the backup contents to file "
C:\employee.TRN
". The.TRN
extension is commonly used to indicate that the backup is a transaction log backup.Using SQL Server Management Studio:
Right-click the database name.
Select Tasks → Backup.
Select Transaction Log as the backup type.
Select Disk as the destination.
Click Add.. to add a backup file and type "
C:\company.TRN
" and click OK.Click OK again to create the backup.
Figure 1: SQL Server Management Studio
If you get an error requesting that you take a log backup, then try the following commands to resolve the issue.
NOTE
Database administrators can try adapting the mentioned commands according to their requirements.
USE master;
GO
ALTER DATABASE <Name-of-your-database>
SET RECOVERY FULL;
GO
USE master;
GO
For example:
USE master;
GO
ALTER DATABASE SourceDatabase
SET RECOVERY FULL;
GO
USE master;
GO
EXEC sp_addumpdevice 'disk', 'EncryptedSourceDatabaseBackupLog',
'\\Server-2\NetWorkShareFolder\SourceDatabase_20160210122459';
GO
NOTE
You should have provided a path to your backups when setting up your availability group.
EXEC sp_addumpdevice 'disk', '<Name-of-your-device>',
‘<Path-to-your-backups>\<Name-of-your-log-backup-file>';
GO
Run the following command to take the back up of logs:
BACKUP LOG <Name-of-your-database> TO <Name-of-your-device>;
GO
For example:
BACKUP LOG SourceDatabase TO EncryptedSourceDatabaseBackupLog;
GO
Run the following command to drop the backup device:
EXEC sp_dropdevice '<Name-of-your-device>';
For example:
EXEC sp_dropdevice 'EncryptedSourceDatabaseBackupLog';
Run the following command to break any connection with the SourceDatabase so that encryption can commence:
USE [master];
GO
Run the following command to enable TDE (switch on encryption) on the SourceDatabase:
ALTER DATABASE SourceDatabase SET ENCRYPTION ON;
GO
4.0 Logging
Run the following command on the admin command prompt to find the External Key Management (EKM) logs:
cd c:\
dir /s/a "EkmLog.txt"
The EKM log file is always located at the following path: C:\Windows\ServiceProfiles\MSSQLSERVER\AppData\Roaming\Fortanix\KmsClient
.
Where, MSSQLSERVER
will change according to your local setup.
5.0 Upgrading KMS Client
NOTE
The upgrade from Fortanix CNG provider to Microsoft SQL Server EKM provider will uninstall the old CNG provider and install the latest downloaded version.
It is highly recommended to plan for any potential downtime.
Make sure to take the latest backup of your database to ensure the safety and security of your data.
Download the latest CNG client from
cng-ekm.Check the current EKM library installation.
SELECT [provider_id] [name] ,[guid] ,[version] ,[dll_path] ,[is_enabled] FROM [model].[sys].[cryptographic_providers] SELECT [provider_id],[guid],[provider_version] ,[sqlcrypt_version] ,[friendly_name] ,[authentication_type] ,[symmetric_key_support] ,[symmetric_key_persistance] ,[symmetric_key_export] ,[symmetric_key_import] ,[asymmetric_key_support] ,[asymmetric_key_persistance] ,[asymmetric_key_export] ,[asymmetric_key_import] FROM [master].[sys].[dm_cryptographic_provider_properties]
Disable the cryptographic provider.
ALTER CRYPTOGRAPHIC PROVIDER EKM_Prov_name DISABLE; GO
Uninstall the old library.
Install a new library and verify it. Set the below environment variables.
Fortanixkmsclient.exe machine --api-endpoint <endpoint_URL>
Register the new library.
ALTER CRYPTOGRAPHIC PROVIDER EKM_Prov_name FROM FILE = 'C:\Program Files\Fortanix\KmsClient\FortanixKmsEkmProvider.dll'
Enable the cryptographic provider.
ALTER CRYPTOGRAPHIC PROVIDER EKM_Prov Enable; GO
Restart the MSSQL services.
NOTE
For cluster setup, it is recommended to upgrade the secondary nodes before upgrading the primary.
The latest library is now installed on the system.
6.0 Frequently Asked Questions
Is there a way to recover the encryption key from the SQL wrapping key?
There is currently no way to recover the encryption key from the SQL wrapping key. However, in the case of clustered SQL environment you can use the read only SQL node to get the key.