Always Encryption in Azure SQL ( Client Side Encryption)

135 Views Asked by At

I've Implemented Always Encryption method in my Project, after knowing that it encrypts's the data in Client Side Code and Never reveals the Data to DataBase Engine.

I've gone through here and here and got a Clear Idea that Encryption/Decryption is done in Client Level(Driver).

Also, I've already posted a Question on this site too and got the Same Answers.

Although, I've needed to prove it to my Officials that between the Database Call and Client Code the data's will be encrypted.They simply ignore the Documentation.

How should I've able to prove them that during the network between the client and SQL server the Data in Encrypted and not Decrypted?

I tried with Process monitor. But it does not seem to work, it listing all the process behind the Visual Studio Execution(mostly DLL Calls)


Can i use Fiddler to Monitor ?

2

There are 2 best solutions below

0
On BEST ANSWER

You can use SQL profiler that can be accessed through SSMS.
You can find it in SSMS menu as Tools -> Sql Server Profiler.
With some google search, you can find resources on how to use it.

I would create two tables having the same schema. Encrypt a couple of columns of one of the tables using Always Encrypted.
Run select, insert and point lookup queries for each table. You will see that for table with Always Encrypted columns, you will see encrypted values being sent to SQL Server for the encrypted columns whereas for plaintext table all the values sent to the server will be in plain text.

0
On

SQL-Profiler is a good way to Prove the Data is Encrypted through-out the Network.I've tried with Fiddler as well as SQL Profile. Both Proved my data were encrypted through out the Channel between Client and SQL Server. I would like to Show Images on this. (May be helpful for others)

Fiddler (Client Network Traffic) enter image description here

SQL-Profiler (Data's from Client to SQL Server as Encrypted)

enter image description here