Snowflake security : securing your Snowflake data cloud / Ben Herzberg, Yoav Cohen.
2022
QA76.9.A25 H47 2022
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Snowflake security : securing your Snowflake data cloud / Ben Herzberg, Yoav Cohen.
Author
ISBN
9781484273890 (electronic bk.)
1484273893 (electronic bk.)
9781484273883
1484273885
1484273893 (electronic bk.)
9781484273883
1484273885
Published
[Berkeley] : Apress, [2022]
Copyright
©2022
Language
English
Description
1 online resource : illustrations
Item Number
10.1007/978-1-4842-7389-0 doi
Call Number
QA76.9.A25 H47 2022
Dewey Decimal Classification
005.8
Summary
This book is your complete guide to Snowflake security, covering account security, authentication, data access control, logging and monitoring, and more. It will help you make sure that you are using the security controls in a right way, are on top of access control, and making the most of the security features in Snowflake. Snowflake is the fastest growing cloud data warehouse in the world, and having the right methodology to protect the data is important both to data engineers and security teams. It allows for faster data enablement for organizations, as well as reducing security risks, meeting compliance requirements, and solving data privacy challenges. There are currently tens of thousands of people who are either data engineers/data ops in Snowflake-using organizations, or security people in such organizations. This book provides guidance when you want to apply certain capabilities, such as data masking, row-level security, column-level security, tackling role hierarchy, building monitoring dashboards, etc., to your organizations. What You Will Learn Implement security best practices for Snowflake Set up user provisioning, MFA, OAuth, and SSO Set up a Snowflake security model Design roles architecture Use advanced access control such as row-based security and dynamic masking Audit and monitor your Snowflake Data Cloud.
Note
Includes index.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file
PDF
Source of Description
Description based on print version record.
Added Author
Available in Other Form
Linked Resources
Record Appears in
Table of Contents
Chapter 1. Introduction
Chapter 2. Account Security
Chapter 3. Authentication
Chapter 4. Data Access Control
Chapter 5. Logging and Monitoring
Chapter 6. Epilogue.
Chapter 2. Account Security
Chapter 3. Authentication
Chapter 4. Data Access Control
Chapter 5. Logging and Monitoring
Chapter 6. Epilogue.