Create a Baseline Authentication Infrastructure with Snowflake using Stored Procedures and Metabase

Photo by Anna Dziubinska on Unsplash

Modern Database Administrators face significant security challenges on cloud-enabled databases like Snowflake. Whether setting up a new database or assessing user security on an existing database, you will want to monitor user authentication and access patterns to prevent unauthorized access.

This article provides a quick startup template ensuring your access points are secure and a means to monitor user activity to keep your database safe.

  • Monitor and Alert on security
  • Give users the Minimum Privilege on the database
  • Enforce Separation by using Limited Role Access

Snowflake’s Access Security Challenges

Snowflake is a data warehouse provided as a Software as a Service through HTTPS. Since it’s on the internet, many potential bad actors can attempt to access the data, and we will need to apply all controls at our disposal to prevent unauthorized access.

Use Role-Based Access Control (RBAC) and Least Privilege

The service user accesses the database through ETL or a Business Analytics toolbar. By Principle of Least Privilege, here is a…

--

--