{"id":39967,"date":"2022-11-29T06:58:03","date_gmt":"2022-11-29T11:58:03","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=39967"},"modified":"2022-11-28T11:00:44","modified_gmt":"2022-11-28T16:00:44","slug":"snowflake-security-vs-data-privacy-regulating-internal-data-access","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/snowflake-security-vs-data-privacy-regulating-internal-data-access\/","title":{"rendered":"Snowflake Security vs. Data Privacy: Regulating Internal Data Access"},"content":{"rendered":"

We wrap up our Snowflake security and privacy blog series talking about how you can regulate your internal data and protect the reputation of your organization.<\/h2>\n
\n

The up-and-coming data cloud Snowflake makes providing high-performance data access easier and more efficient than traditional databases, giving us the opportunity to get more value from our information. But, it also requires us to think differently about keeping data safe.<\/p>\n

In this six-part blog series<\/a>, we\u2019ve laid out some best practices for managing information access and Snowflake security, from organizing and isolating data<\/a> to object tagging<\/a>. In our final entry, we\u2019ll discuss a balanced approach to internal controls and share some guiding principles that will help us make decisions along the way.<\/p>\n

Snowflake Security vs. Privacy<\/h2>\n

Data security refers to protecting data from outside access or interference (essentially, blocking hackers). In Snowflake<\/a>, all data is encrypted while in motion and while at rest. This protects data from direct outside theft. If desired, special Snowflake accounts are available for federal government work and for HIPAA compliance, but even the standard Snowflake environment is highly secure.<\/strong><\/p>\n

A well-configured, secure Snowflake<\/a> environment leveraging tools like Active Directory integration and Single Sign-On will not allow any direct access from outside your organization \u2013 employees will be able to log in from within your network, but external users will access data only through interfaces you create or provide, such as dashboards or applications (or tightly-controlled data shares, if desired). Employees using SSO authentication against their Active Directory accounts will automatically lose access if they leave the organization.<\/p>\n

Of greater concern is the proper protection of data privacy within the world of authorized users.<\/p>\n

Protecting Data Access and Your Reputation<\/h2>\n

As I mentioned in part one<\/a>, information is simultaneously valuable and dangerous. Technology companies have (intentionally or unintentionally) been careless about protecting private consumer data since the rise of the internet and social media. Global governments are stepping in to hold companies accountable:<\/p>\n