Details

Snowflake Security


Snowflake Security

Securing Your Snowflake Data Cloud

von: Ben Herzberg, Yoav Cohen

56,99 €

Verlag: Apress
Format: PDF
Veröffentl.: 05.10.2021
ISBN/EAN: 9781484273890
Sprache: englisch

Dieses eBook enthält ein Wasserzeichen.

Beschreibungen

This book is your complete guide to Snowflake security, covering account security, authentication, data access control, logging and monitoring, and more. It will help you make sure that you are using the security controls in a right way, are on top of access control, and making the most of the security features in Snowflake.<p></p>

<p>Snowflake is the fastest growing cloud data warehouse in the world, and having the right methodology to protect the data is important both to data engineers and security teams. It allows for faster data enablement for organizations, as well as reducing security risks, meeting compliance requirements, and solving data privacy challenges.</p>

<p>There are currently tens of thousands of people who are either data engineers/data ops in Snowflake-using organizations, or security people in such organizations. This book provides guidance when you want to apply certain capabilities, such as data masking, row-level security, column-level security, tackling role hierarchy, building monitoring dashboards, etc., to your organizations.<br></p><p><br></p>

<p><b>What You Will Learn</b></p>

<p></p><ul><li>Implement security best practices for Snowflake<br></li><li>Set up user provisioning, MFA, OAuth, and SSO</li><li>Set up a Snowflake security model</li><li>Design roles architecture</li><li>Use advanced access control such as row-based security and dynamic masking</li><li>Audit and monitor your Snowflake Data Cloud</li></ul><p></p>

<p><b><br></b></p><p><b>Who This Book Is For</b></p>

<p>Data engineers, data privacy professionals, and security teams either with security knowledge (preferably some data security knowledge) or with data engineering knowledge; in other words,&nbsp; either “Snowflake people” or “data people” who want to get security right, or “security people” who want to make sure that Snowflake gets handled right in terms of security</p>
<b>Chapter 1. Introduction to Snowflake</b><p><b> <br> </b></p>

<p>What’s happening to data<br> <br> </p>

<p>Where Snowflake fits in<br> <br> </p>

<p>Building your first Snowflake Data Warehouse<br> <br> </p>

<p>&nbsp;</p>

<p><b>Chapter 2. Account Security<br> <br> </b></p>

<p>Security Best Practices for Snowflake<br> <br> </p>

<p>Private Link Connection<br> <br> <br> </p>

<p><b>Chapter 3. Authentication<br> <br> </b></p>

<p>Authentication in Snowflake overview<br> <br> </p>

<p>Setting Up MFA<br> <br> </p>

<p>Setting Up OAuth<br> <br> </p>

<p>Setting Up SSO<br> <br> </p>

<p>Connecting through a 3rd party SSO<br> <br> </p>

<p>Connecting through a custom OAuth Authentication Service<br> <br> </p>

<p>Network Access Control<br> <br> </p>

<p>Managing Roles Through SCIM<br> <br> </p>

<p>&nbsp;</p>

<p><b>Chapter 4. Data Access Control<br> <br> </b></p>

<p>Introduction to Data Access Controls<br> <br> </p>

<p>Snowflake Security Model<br> <br> </p>

<p>Designing roles architecture<br> <br> </p>

<p>Custom Data Access Control<br> <br> </p>

<p>Column Based Access Control<br> <br> </p>

<p>Using Abstraction<br> <br> </p>

Using Dynamic Masking<br> <br> <p></p>

<p>Row Based Access Control<br> <br> </p>

<p>Using Abstraction<br> <br> </p>

<p>Using Row Based Policies<br> <br> </p>

<p>Custom Access Control<br> <br> </p>

<p>&nbsp;</p>

<p><b>Chapter 5. Logging & Monitoring<br> <br> </b></p>

<p>Introduction<br> <br> </p>

<p>Snowflake Metadata<br> <br> </p>

<p>Account Usage vs Information Schema<br> <br> </p>

<p>Main Views for Security<br> <br> </p>

<p>Limitations<br> <br> </p>

<p>SnowAlert<br> <br> </p>

<p>Building a Custom Security Dashboard<br> <br> </p>

Setting Things Up<br> <br> <p></p>

<p>Dashboard<br> <br> </p>

<p>Incident Response<br> <br> </p>

<p>&nbsp;</p>

<p><b>Chapter 6. Epilogue<br> <br> </b></p>

<p>Recap<br> <br> </p>

What’s Coming Up
<b>Ben Herzberg</b> is an experienced hacker and developer with years of experience in endpoint security, behavioral analytics, application security, and data security. His professional experience in development, research, and security includes roles such as the CTO of Cynet and leading the threat research group at Imperva. Ben is now the Chief Scientist for Satori, streamlining data access and security with DataSecOps. Ben also loves to write, speak at conferences, travel, and meet new people.<div><p></p><div><b>Yoav Cohen</b>&nbsp;is the Co-Founder and Chief Technology Officer of Satori Cyber. At Satori, Yoav is building the company’s technology vision and leading the research and engineering teams. Before founding Satori Cyber, Yoav was the Senior Vice President of Product Development for Imperva, which he joined as part of the acquisition of Incapsula, a cloud-based web applications security and acceleration company, where he was the Vice President of Engineering. Before joining Incapsula, Yoav held several technology leadership positions at SAP. When he isn’t glued to his laptop or on a whiteboard, Yoav can be found traveling with his wife and four kids in an RV, playing electric guitar, or doing laps at the pool. He is still dreaming about building his own operating system. Yoav holds an MSc in computer science from Tel-Aviv University and a BSc in computer science and biology from Tel-Aviv University.</div> <p>&nbsp;</p></div>
This book is your complete guide to Snowflake security, covering account security, authentication, data access control, logging and monitoring, and more. It will help you make sure that you are using the security controls in a right way, are on top of access control, and making the most of the security features in Snowflake.<p></p><p>Snowflake is the fastest growing cloud data warehouse in the world, and having the right methodology to protect the data is important both to data engineers and security teams. It allows for faster data enablement for organizations, as well as reducing security risks, meeting compliance requirements, and solving data privacy challenges.</p><p>There are currently tens of thousands of people who are either data engineers/data ops in Snowflake-using organizations, or security people in such organizations. This book provides guidance when you want to apply certain capabilities, such as data masking, row-level security, column-level security, tackling role hierarchy, building monitoring dashboards, etc., to your organizations.<br></p><p>What You Will Learn<br></p><p></p><ul><li>Implement security best practices for Snowflake<br></li><li>Set up user provisioning, MFA, OAuth, and SSO</li><li>Set up a Snowflake security model</li><li>Design roles architecture</li><li>Use advanced access control such as row-based security and dynamic masking</li><li>Audit and monitor your Snowflake Data Cloud</li></ul><p></p><p><br></p>
<p>Keep your data secure, maintain privacy, and control the activity in your data cloud</p><p>Achieve your security goals such as reducing risks when using Snowflake</p><p>Manage user access to data, including granular access control such as row-level security and dynamic masking</p>

Diese Produkte könnten Sie auch interessieren:

c't Working with AI
c't Working with AI
von: c't-Redaktion
EPUB ebook
12,99 €
c't Working with AI
c't Working with AI
von: c't-Redaktion
EPUB ebook
12,99 €
c't Working with AI
c't Working with AI
von: c't-Redaktion
PDF ebook
12,99 €