|
|
|||
|
||||
OverviewThis book is your complete guide to Snowflake security, covering account security, authentication, data access control, logging and monitoring, and more. It will help you make sure that you are using the security controls in a right way, are on top of access control, and making the most of the security features in Snowflake. Snowflake is the fastest growing cloud data warehouse in the world, and having the right methodology to protect the data is important both to data engineers and security teams. It allows for faster data enablement for organizations, as well as reducing security risks, meeting compliance requirements, and solving data privacy challenges. There are currently tens of thousands of people who are either data engineers/data ops in Snowflake-using organizations, or security people in such organizations. This book provides guidance when you want to apply certain capabilities, such as data masking, row-level security, column-level security, tackling rolehierarchy, building monitoring dashboards, etc., to your organizations. What You Will Learn Implement security best practices for Snowflake Set up user provisioning, MFA, OAuth, and SSO Set up a Snowflake security model Design roles architecture Use advanced access control such as row-based security and dynamic masking Audit and monitor your Snowflake Data Cloud Who This Book Is For Data engineers, data privacy professionals, and security teams either with security knowledge (preferably some data security knowledge) or with data engineering knowledge; in other words, either “Snowflake people” or “data people” who want to get security right, or “security people” who want to make sure that Snowflake gets handled right in terms of security Full Product DetailsAuthor: Ben Herzberg , Yoav CohenPublisher: APress Imprint: APress Edition: 1st ed. Weight: 0.426kg ISBN: 9781484273883ISBN 10: 1484273885 Pages: 192 Publication Date: 06 October 2021 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of ContentsChapter 1. Introduction to Snowflake What’s happening to data Where Snowflake fits in Building your first Snowflake Data Warehouse Chapter 2. Account Security Security Best Practices for Snowflake Private Link Connection Chapter 3. Authentication Authentication in Snowflake overview Setting Up MFA Setting Up OAuth Setting Up SSO Connecting through a 3rd party SSO Connecting through a custom OAuth Authentication Service Network Access Control Managing Roles Through SCIM Chapter 4. Data Access Control Introduction to Data Access Controls Snowflake Security Model Designing roles architecture Custom Data Access Control Column Based Access Control Using Abstraction Using Dynamic Masking Row Based Access Control Using Abstraction Using Row Based Policies Custom Access Control Chapter 5. Logging & Monitoring Introduction Snowflake Metadata Account Usage vs Information Schema Main Views for Security Limitations SnowAlert Building a Custom Security Dashboard Setting Things Up Dashboard Incident Response Chapter 6. Epilogue Recap What’s Coming UpReviewsAuthor InformationBen Herzberg is an experienced hacker and developer with years of experience in endpoint security, behavioral analytics, application security, and data security. His professional experience in development, research, and security includes roles such as the CTO of Cynet and leading the threat research group at Imperva. Ben is now the Chief Scientist for Satori, streamlining data access and security with DataSecOps. Ben also loves to write, speak at conferences, travel, and meet new people. Yoav Cohen is the Co-Founder and Chief Technology Officer of Satori Cyber. At Satori, Yoav is building the company’s technology vision and leading the research and engineering teams. Before founding Satori Cyber, Yoav was the Senior Vice President of Product Development for Imperva, which he joined as part of the acquisition of Incapsula, a cloud-based web applications security and acceleration company, where he was the Vice President of Engineering. Before joining Incapsula, Yoav held several technology leadership positions at SAP. When he isn’t glued to his laptop or on a whiteboard, Yoav can be found traveling with his wife and four kids in an RV, playing electric guitar, or doing laps at the pool. He is still dreaming about building his own operating system. Yoav holds an MSc in computer science from Tel-Aviv University and a BSc in computer science and biology from Tel-Aviv University. Tab Content 6Author Website:Countries AvailableAll regions |