In our previous blog, we explored how securing Snowflake’s cloud involves a shared responsibility model between Snowflake and its customers. To support customers with their security obligations, Snowflake has outlined its Shared Responsibility Model and partnered with the Center for Internet Security (CIS) to provide best practices for securing Snowflake environments.
TrustLogix, as a trusted Snowflake partner enhances this framework by offering CIS-aligned guardrails and actionable insights across critical areas such as Identity and Access Management (IAM), Monitoring and Alerting, Network Security, and Data Protection. TrustLogix’s solutions help automate security controls across Snowflake instances, enabling enterprises to effectively manage data security for compliance, risk management, and real-time visibility to maintain their end of shared responsibility model. Additionally, as part of Data Security Posture Management offering , Truslogix discovers and monitors data access and sharing activities. It alerts to any unexpected data sharing, data exfiltration risks, and overly privileged roles, allowing security teams to manage business risks and avoid data breaches
This, in turn, allows Data Engineering teams to focus on their core projects rather than managing data security, which accelerates data projects, boosts productivity, and reduces the time it takes for data consumers—such as analysts, bots, and AI models—to access data.
The CIS Benchmarks for Snowflake offer a comprehensive set of recommendations to securely configure Snowflake environments across several critical areas:
Based on the Snowflake Shared Responsibility Model, customers are responsible for implementing security controls in each of the areas
Some of the other monitoring policies that TrustLogix provides based on the CIS Benchmark are as follows :
Category | CIS Based Policy |
Identity and Access Management | 1.8 Ensure that users who did not log in for 90 days are disabled |
1.13 Ensure that the ACCOUNTADMIN or SECURITYADMIN role is not granted to any custom role | |
Monitoring and Alerting | 2.1 Ensure monitoring and alerting exist for ACCOUNTADMIN and SECURITYADMIN role grants |
2.2 Ensure monitoring and alerting exist for MANAGE GRANTS privilege grants | |
2.4 Ensure monitoring and alerting exist for password sign-in without MFA | |
2.8 Ensure monitoring and alerting exists for new share exposures | |
2.9 Ensure monitoring and alerting exists for sessions from unsupported Snowflake Connector for Python and JDBC and ODBC drivers | |
Network Security | 3.1 Ensure that an account-level network policy has been configured to only allow access from trusted IP addresses |
Data Protection | 4.6 Ensure that the REQUIRE_STORAGE_INTEGRATION_FOR_STAGE_OPERATION account parameter is set to true |
4.7 Ensure that all external stages have storage integrations | |
4.8 Ensure that the PREVENT_UNLOAD_TO_INLINE_URL account parameter is set to true |
Beyond the CIS benchmarks, TrustLogix offers additional policies targeting Shadow IT risks and regulatory compliance. Here are a few notable examples:
Some of the other monitoring policies that TrustLogix provides are as follows :
Policy Name | Description |
Monitor_password_state_change | Monitor for any password state change |
Monitor_key_pair_auth_state_change | Monitor for any key pair authentication state change |
Monitor_auth_policy_state_change | Monitor for authentication policy state change |
Monitor_classified_data_export | Monitor for data export activity of data classified as Privacy Sensitive |
Discover_export_to_public_bucket | Data Exfiltration: Detect copy of data to a publicly accessible S3 bucket |
Detect_senstitive_schema_clone_operations | Monitor Clone of Schema classified as Privacy Sensitive by unlisted users |
Monitor_data_export_privilege_assignment | Monitor "Imported Privileges" privilege assignment to any role |
Detect_access_of_privacy_category_objects | Monitor Clone of Database classified as Privacy Sensitive by unlisted users |
Detect_deletion_of_privacy_category_table_data | Detect and notify deletion of Privacy Sensitive data |
Monitor_privileges_granted_on_classified_data_to_public_role | Regulatory Compliance: Identify Privacy Sensitive data granted to PUBLIC role |
TrustLogix's monitoring policies enhance Snowflake security by aligning with CIS benchmarks as well as by providing its own security best practices. These policies cover areas such as IAM, monitoring and alerting, network security, data protection, and additional risks such as logins from Shadow Apps / Suspicious IP’s, monitoring users with old passwords and DDL operations. By addressing these threats, organizations can strengthen defenses against emerging risks.
Through its partnership with Snowflake, TrustLogix helps enterprises securely manage data, ensure regulatory compliance, and accelerate data projects within the shared responsibility model. As a Data Security Posture Management vendor , Truslogix discovers and monitors data access and sharing activities, alerts to any unexpected data sharing, data exfiltration risks, and overly privileged roles, allowing security teams to manage business risks and avoid data breaches
Want to learn more?
Get a free data security assessment on your Snowflake accounts and secure sensitive data with TrustLogix’s out-of-the-box monitoring policies. Register for free 90-day data protection service.