Auditing enhancements for encrypted columns

Auditing for encrypted columns includes these changes:

Auditing key custodian actions

Use this command to audit all actions in which keycustodian_role is active:

sp_audit "all", "keycustodian_role", "all", "on"

Additional auditing events

The encryption_key audit option writes these events and information to the audit table for encrypted columns.

Table 2-3: Auditing events for the encryption_key audit option

Command to be audited

Event number

Information in extrainfo output

create encryption key

107

Type of password, user or system

AEK as/not default

108

Modify encryption key to be the database default key or remove the default property from the key.

AEK modify encryption

118

modify encryption with user passwd

or

with login passwd 
[for user user_name]
[with keyvalue [for recovery]]

AEK add encryption

119

add encryption for user user_name
with user passwd [for recovery]

or

for login association [with keyvalue]

AEK drop encryption

120

drop encryption [for recovery] [for user]

AEK modify owner

121

modify owner
new owner user_name

AEK key recovery

122

recover key [with keyvalue]

Masking passwords in command text auditing

Passwords are masked in the audit records produced by command text auditing. For example, if the SSO has enabled command text auditing for user “alan” in database db1:

sp_audit "cmdtext", "alan", "db1", "on" 

And “alan” issues this command:

create encryption key key1 with passwd "bigsecret"

Adaptive Server writes the following SQL text to the extrainfo column of the audit table:

"create encryption key key1 with passwd "xxxxxx"