Description
Snowflake Security, 1st ed.
Securing Your Snowflake Data Cloud
Authors: Herzberg Ben, Cohen Yoav
Language: EnglishSubject for Snowflake Security:
192 p. · 17.8x25.4 cm · Paperback
Description
/li>Contents
/li>Biography
/li>Comment
/li>
Snowflake is the fastest growing cloud data warehouse in the world, and having the right methodology to protect the data is important both to data engineers and security teams. It allows for faster data enablement for organizations, as well as reducing security risks, meeting compliance requirements, and solving data privacy challenges.
There are currently tens of thousands of people who are either data engineers/data ops in Snowflake-using organizations, or security people in such organizations. This book provides guidance when you want to apply certain capabilities, such as data masking, row-level security, column-level security, tackling role hierarchy, building monitoring dashboards, etc., to your organizations.
What You Will Learn
- Implement security best practices for Snowflake
- Set up user provisioning, MFA, OAuth, and SSO
- Set up a Snowflake security model
- Design roles architecture
- Use advanced access control such as row-based security and dynamic masking
- Audit and monitor your Snowflake Data Cloud
Who This Book Is For
Data engineers, data privacy professionals, and security teams either with security knowledge (preferably some data security knowledge) or with data engineering knowledge; in other words, either ?Snowflake people? or ?data people? who want to get security right, or ?security people? who want to make sure that Snowflake gets handled right in terms of security
What’s happening to data
Where Snowflake fits in
Building your first Snowflake Data Warehouse
Chapter 2. Account Security
Security Best Practices for Snowflake
Private Link Connection
Chapter 3. Authentication
Authentication in Snowflake overview
Setting Up MFA
Setting Up OAuth
Setting Up SSO
Connecting through a 3rd party SSO
Connecting through a custom OAuth Authentication Service
Network Access Control
Managing Roles Through SCIM
Chapter 4. Data Access Control
Introduction to Data Access Controls
Snowflake Security Model
Designing roles architecture
Custom Data Access Control
Column Based Access Control
Using Abstraction
Row Based Access Control
Using Abstraction
Using Row Based Policies
Custom Access Control
Chapter 5. Logging & Monitoring
Introduction
Snowflake Metadata
Account Usage vs Information Schema
Main Views for Security
Limitations
SnowAlert
Building a Custom Security Dashboard
Dashboard
Incident Response
Chapter 6. Epilogue
Recap
Keep your data secure, maintain privacy, and control the activity in your data cloud
Achieve your security goals such as reducing risks when using Snowflake
Manage user access to data, including granular access control such as row-level security and dynamic masking