{"id":39952,"date":"2022-11-25T08:47:47","date_gmt":"2022-11-25T13:47:47","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=39952"},"modified":"2022-11-29T08:22:09","modified_gmt":"2022-11-29T13:22:09","slug":"blog-series-snowflake-security-and-data-privacy","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/blog-series-snowflake-security-and-data-privacy\/","title":{"rendered":"Blog Series: Snowflake Security and Data Privacy"},"content":{"rendered":"
Storing your analytical data in Snowflake opens a new world of possibilities for information access and security.<\/p>\n
Snowflake is a database platform like SQL Server or Oracle but purpose-built from scratch for the cloud. Its developers kept familiar concepts (tables, views, SQL queries) but threw out all assumptions about how databases traditionally work and embraced everything cloud computing offers. You can read more about the basics of the platform here.<\/p>\n
Snowflake\u2019s underlying architecture makes it easy to provide high-performance data access to any number of internal and external users with far more efficiency than traditional databases. Organizations can extract enormous value from the data they collect in Snowflake<\/a> if they can keep it organized and accessible while not allowing sensitive information to escape.<\/strong><\/p>\n This six-part series will propose a set of technology, architecture, and process standards to support these goals while balancing cost, maintainability, and performance.<\/p>\n Snowflake Security and Data Privacy: Identifying, Organizing and Isolating Data<\/a> Snowflake Security and Data Privacy: Granular Access Control with Snowflake\u2019s Advanced Features<\/a> Snowflake Security and Data Privacy: Using Snowflake Tags to Boost Privacy and Security<\/a> Snowflake Security and Data Privacy: Establishing Row Access Policies<\/a>Read the Series<\/h2>\n
\nWe start the series by walking through how to identify the data at hand across several dimensions and fine-tune access to ensure each consumer only sees exactly what you want them to see, right down to the row and column level.<\/p>\n
\nNext, we take identifying, organizing, and isolating data a step further using some of Snowflake\u2019s advanced features. Part two covers the concept of data granularity: how to apply rules that control specific rows and columns from a single table that a given user can see.<\/p>\n
\nSnowflake tags are another tool you can use to support your data security efforts. In part three of this blog series, we explain what object tagging is and how you can use it for data governance.<\/p>\n
\nAs we continue our blog series with part four, we break down how you can use Snowflake row access policies to keep sensitive data protected.<\/p>\n