{"id":39952,"date":"2022-11-25T08:47:47","date_gmt":"2022-11-25T13:47:47","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=39952"},"modified":"2022-11-29T08:22:09","modified_gmt":"2022-11-29T13:22:09","slug":"blog-series-snowflake-security-and-data-privacy","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/blog-series-snowflake-security-and-data-privacy\/","title":{"rendered":"Blog Series: Snowflake Security and Data Privacy"},"content":{"rendered":"

More and more businesses are using the cloud platform Snowflake because it\u2019s fast and easy to use, but they still need to consider data privacy. This blog series lays out best practices for managing information access and security in the platform.<\/h2>\n
\n

Storing your analytical data in Snowflake opens a new world of possibilities for information access and security.<\/p>\n

Snowflake is a database platform like SQL Server or Oracle but purpose-built from scratch for the cloud. Its developers kept familiar concepts (tables, views, SQL queries) but threw out all assumptions about how databases traditionally work and embraced everything cloud computing offers. You can read more about the basics of the platform here.<\/p>\n

Snowflake\u2019s underlying architecture makes it easy to provide high-performance data access to any number of internal and external users with far more efficiency than traditional databases. Organizations can extract enormous value from the data they collect in Snowflake<\/a> if they can keep it organized and accessible while not allowing sensitive information to escape.<\/strong><\/p>\n

This six-part series will propose a set of technology, architecture, and process standards to support these goals while balancing cost, maintainability, and performance.<\/p>\n

Read the Series<\/h2>\n

Snowflake Security and Data Privacy: Identifying, Organizing and Isolating Data<\/a>
\nWe start the series by walking through how to identify the data at hand across several dimensions and fine-tune access to ensure each consumer only sees exactly what you want them to see, right down to the row and column level.<\/p>\n

Snowflake Security and Data Privacy: Granular Access Control with Snowflake\u2019s Advanced Features<\/a>
\nNext, we take identifying, organizing, and isolating data a step further using some of Snowflake\u2019s advanced features. Part two covers the concept of data granularity: how to apply rules that control specific rows and columns from a single table that a given user can see.<\/p>\n

Snowflake Security and Data Privacy: Using Snowflake Tags to Boost Privacy and Security<\/a>
\nSnowflake tags are another tool you can use to support your data security efforts. In part three of this blog series, we explain what object tagging is and how you can use it for data governance.<\/p>\n

Snowflake Security and Data Privacy: Establishing Row Access Policies<\/a>
\nAs we continue our blog series with part four, we break down how you can use Snowflake row access policies to keep sensitive data protected.<\/p>\n

Snowflake Security and Data Privacy: Snowflake Roles \u2013 Pulling it All Together<\/a>
\nIn part five of this blog series, we explain how Snowflake roles keep data access and privacy policies organized and universal by establishing who has access to what on both a data and compute level in a centralized location<\/p>\n

Snowflake Security and Data Privacy: Snowflake Security vs. Privacy —<\/strong> Regulating Internal Data Access<\/strong><\/a>
\nIn our final entry, we\u2019ll discuss a balanced approach to internal controls and some guiding principles that will help you make decisions along the way using the tools from the rest of the series.<\/p>\n\n

\n
\n Data governance is essential to creating trustworthy, sustainable and repeatable value through data. What does that mean for you?\n <\/div>\n
\n \n\n Watch Our Webinar\n <\/a>\n <\/div>\n <\/div>\n","protected":false},"excerpt":{"rendered":"

More businesses are using the cloud platform Snowflake because it\u2019s fast and easy to use, but they still need to consider data privacy.<\/p>\n","protected":false},"author":178,"featured_media":39956,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1],"tags":[18616,3343],"coauthors":[15561],"acf":[],"publishpress_future_action":{"enabled":false,"date":"2024-07-21 20:57:02","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category"},"_links":{"self":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/39952"}],"collection":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/comments?post=39952"}],"version-history":[{"count":0,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/39952\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media\/39956"}],"wp:attachment":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media?parent=39952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/categories?post=39952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/tags?post=39952"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/coauthors?post=39952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}