<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=4768124&amp;fmt=gif">
Blog

What is Oracle TDE - Transparent Data Encryption?

What It Is, How It Works, and Why It Matters
AdobeStock_447166378-2
ORACLE SE
HYBRID DR
ORACLE TDE
HYBRID DEPLOYMENTS
By Vijayganesh Sivaprakasam |
January 15, 2026 |
Link Clicked!

 

What is Oracle Transparent Data Encryption (TDE)?

Transparent Data Encryption (TDE) is an Oracle Database security feature designed to protect data at rest. It does this by encrypting database files and, in some cases, database objects, while remaining completely transparent to applications and authorised users.

If you work with Oracle databases, you’ve likely encountered Transparent Data Encryption (TDE)—especially during security reviews, compliance audits, or cloud migrations.

In this blog I explain:

This is Blog #2 in a deep dive into Oracle TDE:

Blog #1 - Oracle TDE and Hybrid Disaster Recovery: Why It Breaks & How to Fix It
Blog #3 - TDE licensing - when you're allowed to use it
Blog #4 - Best practice TDE wallet creation & management


What is Oracle Transparent Data Encryption (TDE)?

Transparent Data Encryption (TDE) is an Oracle Database security feature designed to protect data at rest. It does this by encrypting database files and, in some cases, database objects, while remaining completely transparent to applications and authorised users.

From an operational perspective, applications continue to read and write data as normal. From a security perspective, if someone gains access to database files, storage snapshots, or backups without authorisation, the data is unreadable.

This makes TDE a key tool in security, compliance, and cloud security.


Why Oracle TDE matters

Oracle TDE is widely used to meet:

  • Compliance requirements (e.g. GDPR, HIPAA, PCI-DSS)
  • Cloud security standards, especially in Oracle Cloud Infrastructure (OCI), where TDE is enabled by default
  • Data protection policies for backups, snapshots, and storage

It protects against scenarios such as:

  • Lost or stolen database backups
  • Unauthorised access to storage or snapshots
  • Data exposure from infrastructure compromise

TDE is therefore a critical control for securing data at rest, particularly in cloud and hybrid environments.


How does Oracle TDE work?

Oracle TDE uses a two-layer encryption model:

  1. Master encryption key
    • Stored outside the database (wallet, Oracle Key Vault, or OCI KMS)
  2. Data encryption keys
    • Stored inside the database
    • Encrypted using the master key

What happens during operation?

  • When data is written → Oracle encrypts it before storing it on disk
  • When data is read → Oracle decrypts it automatically for authorised users

This process is completely transparent to applications—no schema changes or query modifications are required.


What does Oracle TDE encrypt?

Oracle TDE supports encryption at two levels:

Tablespace encryption

- encrypts all objects stored within the tablespace, including:

  • Data files
  • Associated redo data
  • Segments created within the tablespace

This is the default and recommended approach in most environments, particularly in Oracle Cloud Infrastructure (OCI). Encrypting at the tablespace level provides broad protection without requiring teams to identify individual sensitive columns.

An important note, for Oracle Standard Edition 2 (SE2) on OCI Base Database Service, tablespace encryption is the only supported option. While this removes the ability to encrypt individual columns, it simplifies security design and avoids the operational complexity of managing column-level encryption. 

Column-level encryption

- allows individual columns to be encrypted selectively. This approach can be useful in highly targeted use cases but introduces additional design and operational overhead.


What else is protected?

Beyond data files, TDE also protects:

  • Database backups: Encrypted data remains encrypted in RMAN backups.
  • Redo data: Redo data generated for encrypted tablespaces is also encrypted.
  • Temporary data: Data written to temporary tablespaces during sort operations remains protected.

This ensures that data is protected not only at rest, but also throughout common database operations.


Where are encryption keys stored?

A core principle of Oracle TDE is that encryption keys are not stored in the database itself. This separation is critical for security and compliance.

Oracle uses a two-tier key architecture:

  • A TDE master encryption key, stored externally.
  • Tablespace or column encryption keys are stored in the database, but encrypted using the master key.

The master key is used to encrypt and decrypt the lower-level keys, which in turn protect the data.

TDE wallets

A TDE wallet is a secure container used to store encryption keys. It stores only encryption-related material and is typically managed at the database host level.

Wallet-based key management is commonly used in on-premises environments and remains a practical requirement in hybrid architectures, even when OCI Key Management Service is used on the cloud side.

External key management

Oracle also supports external key management services, including:

  • Oracle Key Vault (on-premises)
  • OCI Key Management Service (KMS)

These services enable centralised management of encryption keys across multiple databases and environments. In OCI, databases can be configured to use OCI KMS instead of local wallets.

For in-depth information on TDE wallets READ : Blog #4 - Best practice TDE wallet creation & management


TDE in multitenant environments

In multitenant databases, keystores can be configured in one of two modes:

United mode

A single keystore and master encryption key are shared across the container database (CDB) and all associated pluggable databases (PDBs). This is the most common configuration and simplifies key management.

Isolated mode

Separate keystores and master keys are managed for the CDB and individual PDBs. This provides stronger isolation but adds operational complexity.

Important limitation: OCI KMS does not support isolated PDB keystores. Applies to  Oracle Exadata Cloud@Customer, Autonomous Database Cloud@Customer, and Oracle Exadata Database Service (as of 2025).


Encryption algorithms and strength

By default, TDE tablespace encryption uses the Advanced Encryption Standard (AES) with a 128-bit key (AES128). This provides strong protection and meets the requirements of most security and compliance frameworks.

Where policy or regulation requires it, stronger algorithms such as AES192 and AES256 can be specified when creating encrypted tablespaces.

Oracle also supports additional algorithms for specific use cases. These are typically relevant for environments with explicit cryptographic requirements.

Oracle TDE Tablespace Encryption


Performance and operational considerations

Oracle TDE is designed to minimise performance impact:

  • Tablespace encryption does not interfere with index range scans
  • RMAN compression continues to function normally
  • Advanced features such as Exadata Hybrid Columnar Compression (HCC) and Advanced Compression are fully supported
In most modern environments, the performance overhead of TDE is negligible.

Why TDE creates challenges in hybrid disaster recovery

While TDE works well within a single environment, it introduces complexity in hybrid DR architectures.

Key challenges include:

  • Encrypted redo logs cannot be applied to non-encrypted databases
  • Key management differs between cloud and on-prem environments
  • Oracle Standard Edition lacks native features to manage encrypted replication

This means:   

Hybrid DR designs can appear to work—
but fail after switchover when encryption states don’t match.

This is especially common in:

  • OCI → on-prem failover scenarios
  • Mixed licensing environments
  • Standard Edition deployments

For more in-depth information READ : Blog #1 Oracle TDE and Hybrid Disaster Recovery: Why It Breaks & How to Fix It


Oracle TDE Summary

  • Encrypts data at rest automatically
  • Requires no application changes
  • Uses external key management
  • Protects backups, redo logs, and temporary data
  • Is enabled by default in OCI
  • Can introduce complexity in hybrid DR environments

TDE is essential for security—but must be carefully designed in disaster recovery architectures.

 

READ other articles in this series:

Blog #2 - What is Oracle TDE?
Blog #3 - TDE licensing - when you're allowed to use it
Blog #4 - Best practice TDE wallet creation & management


FAQ 

What is Oracle Transparent Data Encryption (TDE)?

Oracle Transparent Data Encryption (TDE) is a database security feature that encrypts data at rest, including database files, backups, and redo logs, without requiring changes to applications.


What does Oracle TDE encrypt?

Oracle TDE encrypts data files (tablespaces), redo logs generated from encrypted data, RMAN backups, and temporary data created during database operations.


How does Oracle TDE work?

Oracle TDE works using a two-layer encryption model: a master encryption key stored outside the database and data encryption keys stored inside the database, encrypted by the master key. Data is encrypted before being written to disk and decrypted automatically when read.


Where are Oracle TDE encryption keys stored?

Oracle TDE encryption keys are stored outside the database in a secure keystore, such as a TDE wallet, Oracle Key Vault, or Oracle Cloud Infrastructure (OCI) Key Management Service (KMS).


Why does Oracle TDE break hybrid disaster recovery?

Oracle TDE can break hybrid disaster recovery because encrypted redo logs generated in one environment cannot be applied to a database that is not configured with compatible encryption and key management, causing replication failure after switchover.

 

 

Vijayganesh Sivaprakasam
Vijayganesh Sivaprakasam

Oracle ACE Pro; Head of Customer Services at Dbvisit Software

With over 20 years of experience as an Oracle DBA, Vijayganesh Sivaprakasam has worked across a wide range of environments, from troubleshooting critical database issues in major banking systems to helping organizations automate their disaster recovery (DR) strategies. Recognised as an Oracle ACE Pro, he focuses on enabling businesses to implement seamless DR solutions across Oracle, SQL Server, and PostgreSQL environments. Vijayganesh is passionate about simplifying complex processes and helping others make disaster recovery more efficient and manageable.

Subscribe to our monthly blog updates

By subscribing, you are agreeing to have your personal information managed in accordance with the terms of DBVisit's Privacy Policy


Link Clicked!
Try StandbyMP for free

See for yourself how our continuous database protection can help keep your world in motion.

Find a local partner

We work with partners around the world to give you the best advice and world-class local support.

Mask Group 59
Mask Group 184-1
get a price2
get a price2
Get Pricing

With Dbvisit's StandbyMP software, Gold Standard Disaster Recovery doesn't have to be difficult or expensive. Get an instant quote now.