Published in


Create a Baseline Authentication Infrastructure with Snowflake using Stored Procedures and Metabase

Photo by Anna Dziubinska on Unsplash

Modern Database Administrators face significant security challenges on cloud-enabled databases like Snowflake. Whether setting up a new database or assessing user security on an existing database, you will want to monitor user authentication and access patterns to prevent unauthorized access.




Snowflake articles from engineers using Snowflake to power their data.

Recommended from Medium

Google: my Gmail is not just an e-mail

{UPDATE} Plus Snake Mater Hack Free Resources Generator

Do you care about your privacy? Maybe it is time to set up your own Dropbox.

Bounty Rules v6.0

{UPDATE} Carnival Face Paint Hack Free Resources Generator

BidiPass 2.0 Aims to Provide 2FA to Decentralized Communities

0day — TryHackMe — WriteUp

{UPDATE} 脱出ゲーム Message Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Tim Burns

Tim Burns

Data architect. See my blog My opinions are my own.

More from Medium

Managing Elevated Access in Snowflake — Just Enough, Just-in-Time

How to Reverse Engineer a Snowflake Database Schema

Secure Data Sharing SnowFlake

Snowflake Time Travel