Description
What's happening to data
Where Snowflake fits in
Building your first Snowflake Data Warehouse
Chapter 2. Account Security
Security Best Practices for Snowflake
Private Link Connection
Chapter 3. Authentication
Authentication in Snowflake overview
Setting Up MFA
Setting Up OAuth
Setting Up SSO
Connecting through a 3rd party SSO
Connecting through a custom OAuth Authentication Service
Network Access Control
Managing Roles Through SCIM
Chapter 4. Data Access Control
Introduction to Data Access Controls
Snowflake Security Model
Designing roles architecture
Custom Data Access Control
Column Based Access Control
Using Abstraction
Using Dynamic MaskingRow Based Access Control
Using Abstraction
Using Row Based Policies
Custom Access Control
Chapter 5. Logging & Monitoring
Introduction
Snowflake Metadata
Account Usage vs Information Schema
Main Views for Security
Limitations
SnowAlert
Building a Custom Security Dashboard
Setting Things UpDashboard
Incident Response
Chapter 6. Epilogue
Recap
What's Coming UpAuthor: Ben Herzberg, Yoav Cohen
Publisher: Apress
Published: 01/17/2022
Pages: 130
Binding Type: Paperback
Weight: 0.87lbs
Size: 10.00h x 7.00w x 0.47d
ISBN13: 9781484273883
ISBN10: 1484273885
BISAC Categories:
- Computers | Security | General