Hello Monks,
Given some rather splendid public facing spaffs of database theft in the UK such Talk Talk, I've been checked from mocking by asking 'how would I do it better?' and not finding a good answer.
Now i'm a firm believer in DBIx::Class and properly parametise my SQL when using DBI, but there's always the 'what happens when the enemy has root access' question to which I haven't found a good answer. Security isn't my strong suit and thus I seek your wisdom.
My first thought would be to use Crypt::RSA on personally identifiable columns (name, age, address, possibly email), and storing the private key on some other machine, but how exactly could I establish a system that would be useful and still safe if $n > 1 machines were compromised without resorting to security theatre? Is this even practical?
In reply to Effective database column level encryption? by maruhige
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |