What is Oracle Transparent Data Encryption (TDE)?
Transparent Data Encryption (TDE) is an Oracle Database security feature designed to protect data at rest. It does this by encrypting database files and, in some cases, database objects, while remaining completely transparent to applications and authorised users.
If you work with Oracle databases, you’ve likely encountered Transparent Data Encryption (TDE)—especially during security reviews, compliance audits, or cloud migrations.
In this blog I explain:
Blog #1 - Oracle TDE and Hybrid Disaster Recovery: Why It Breaks & How to Fix It
Blog #3 - TDE licensing - when you're allowed to use it
Blog #4 - Best practice TDE wallet creation & management
What is Oracle Transparent Data Encryption (TDE)?
Transparent Data Encryption (TDE) is an Oracle Database security feature designed to protect data at rest. It does this by encrypting database files and, in some cases, database objects, while remaining completely transparent to applications and authorised users.
From an operational perspective, applications continue to read and write data as normal. From a security perspective, if someone gains access to database files, storage snapshots, or backups without authorisation, the data is unreadable.
This makes TDE a key tool in security, compliance, and cloud security.
Why Oracle TDE matters
Oracle TDE is widely used to meet:
- Compliance requirements (e.g. GDPR, HIPAA, PCI-DSS)
- Cloud security standards, especially in Oracle Cloud Infrastructure (OCI), where TDE is enabled by default
- Data protection policies for backups, snapshots, and storage
It protects against scenarios such as:
- Lost or stolen database backups
- Unauthorised access to storage or snapshots
- Data exposure from infrastructure compromise
TDE is therefore a critical control for securing data at rest, particularly in cloud and hybrid environments.
How does Oracle TDE work?
Oracle TDE uses a two-layer encryption model:
- Master encryption key
- Stored outside the database (wallet, Oracle Key Vault, or OCI KMS)
- Data encryption keys
- Stored inside the database
- Encrypted using the master key
What happens during operation?
- When data is written → Oracle encrypts it before storing it on disk
- When data is read → Oracle decrypts it automatically for authorised users
This process is completely transparent to applications—no schema changes or query modifications are required.
What does Oracle TDE encrypt?
Oracle TDE supports encryption at two levels:
Tablespace encryption
- encrypts all objects stored within the tablespace, including:
- Data files
- Associated redo data
- Segments created within the tablespace
This is the default and recommended approach in most environments, particularly in Oracle Cloud Infrastructure (OCI). Encrypting at the tablespace level provides broad protection without requiring teams to identify individual sensitive columns.
An important note, for Oracle Standard Edition 2 (SE2) on OCI Base Database Service, tablespace encryption is the only supported option. While this removes the ability to encrypt individual columns, it simplifies security design and avoids the operational complexity of managing column-level encryption.
Column-level encryption
- allows individual columns to be encrypted selectively. This approach can be useful in highly targeted use cases but introduces additional design and operational overhead.
What else is protected?
Beyond data files, TDE also protects:
- Database backups: Encrypted data remains encrypted in RMAN backups.
- Redo data: Redo data generated for encrypted tablespaces is also encrypted.
- Temporary data: Data written to temporary tablespaces during sort operations remains protected.
This ensures that data is protected not only at rest, but also throughout common database operations.
Where are encryption keys stored?
A core principle of Oracle TDE is that encryption keys are not stored in the database itself. This separation is critical for security and compliance.
Oracle uses a two-tier key architecture:
- A TDE master encryption key, stored externally.
- Tablespace or column encryption keys are stored in the database, but encrypted using the master key.
The master key is used to encrypt and decrypt the lower-level keys, which in turn protect the data.
TDE wallets
A TDE wallet is a secure container used to store encryption keys. It stores only encryption-related material and is typically managed at the database host level.
Wallet-based key management is commonly used in on-premises environments and remains a practical requirement in hybrid architectures, even when OCI Key Management Service is used on the cloud side.
External key management
Oracle also supports external key management services, including:
- Oracle Key Vault (on-premises)
- OCI Key Management Service (KMS)
These services enable centralised management of encryption keys across multiple databases and environments. In OCI, databases can be configured to use OCI KMS instead of local wallets.
For in-depth information on TDE wallets READ : Blog #4 - Best practice TDE wallet creation & management
TDE in multitenant environments
In multitenant databases, keystores can be configured in one of two modes:
United mode
A single keystore and master encryption key are shared across the container database (CDB) and all associated pluggable databases (PDBs). This is the most common configuration and simplifies key management.
Isolated mode
Separate keystores and master keys are managed for the CDB and individual PDBs. This provides stronger isolation but adds operational complexity.
Important limitation: OCI KMS does not support isolated PDB keystores. Applies to Oracle Exadata Cloud@Customer, Autonomous Database Cloud@Customer, and Oracle Exadata Database Service (as of 2025).
Encryption algorithms and strength
By default, TDE tablespace encryption uses the Advanced Encryption Standard (AES) with a 128-bit key (AES128). This provides strong protection and meets the requirements of most security and compliance frameworks.
Where policy or regulation requires it, stronger algorithms such as AES192 and AES256 can be specified when creating encrypted tablespaces.
Oracle also supports additional algorithms for specific use cases. These are typically relevant for environments with explicit cryptographic requirements.

Performance and operational considerations
Oracle TDE is designed to minimise performance impact:
- Tablespace encryption does not interfere with index range scans
- RMAN compression continues to function normally
- Advanced features such as Exadata Hybrid Columnar Compression (HCC) and Advanced Compression are fully supported
Why TDE creates challenges in hybrid disaster recovery
While TDE works well within a single environment, it introduces complexity in hybrid DR architectures.
Key challenges include:
- Encrypted redo logs cannot be applied to non-encrypted databases
- Key management differs between cloud and on-prem environments
- Oracle Standard Edition lacks native features to manage encrypted replication
This means:
Hybrid DR designs can appear to work—
but fail after switchover when encryption states don’t match.
This is especially common in:
- OCI → on-prem failover scenarios
- Mixed licensing environments
- Standard Edition deployments
For more in-depth information READ : Blog #1 Oracle TDE and Hybrid Disaster Recovery: Why It Breaks & How to Fix It
Oracle TDE Summary
- Encrypts data at rest automatically
- Requires no application changes
- Uses external key management
- Protects backups, redo logs, and temporary data
- Is enabled by default in OCI
- Can introduce complexity in hybrid DR environments
TDE is essential for security—but must be carefully designed in disaster recovery architectures.
READ other articles in this series:
Blog #2 - What is Oracle TDE?
Blog #3 - TDE licensing - when you're allowed to use it
Blog #4 - Best practice TDE wallet creation & management
FAQ
What is Oracle Transparent Data Encryption (TDE)?
Oracle Transparent Data Encryption (TDE) is a database security feature that encrypts data at rest, including database files, backups, and redo logs, without requiring changes to applications.
What does Oracle TDE encrypt?
Oracle TDE encrypts data files (tablespaces), redo logs generated from encrypted data, RMAN backups, and temporary data created during database operations.
How does Oracle TDE work?
Oracle TDE works using a two-layer encryption model: a master encryption key stored outside the database and data encryption keys stored inside the database, encrypted by the master key. Data is encrypted before being written to disk and decrypted automatically when read.
Where are Oracle TDE encryption keys stored?
Oracle TDE encryption keys are stored outside the database in a secure keystore, such as a TDE wallet, Oracle Key Vault, or Oracle Cloud Infrastructure (OCI) Key Management Service (KMS).
Why does Oracle TDE break hybrid disaster recovery?
Oracle TDE can break hybrid disaster recovery because encrypted redo logs generated in one environment cannot be applied to a database that is not configured with compatible encryption and key management, causing replication failure after switchover.
Oracle ACE Pro; Head of Customer Services at Dbvisit Software
Subscribe to our monthly blog updates
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of DBVisit's Privacy Policy