All pages
Powered by GitBook
1 of 1

Loading...

Getting Started

The how-to guides linked on this page illustrate how to integrate Snowflake with Immuta to secure your data with governance policies, discover what data types and sensitive data should be secured, and observe your users' activity to ensure risky user access is caught and addressed.

Requirement: Snowflake Enterprise Edition

Configure your Snowflake integration

Configuring a Snowflake integration is required for Detect, Discover, and Secure. These guides provide information on the recommended features to enable with Snowflake, or see the Detect use case for a comprehensive guide on the benefits of these features and other recommendations.

  1. with the following features enabled:

    • (enabled by default)

    • (enabled by default)

    • (enabled by default)

  2. Select None as your .

  3. .

  4. .

These guides provide step-by-step instructions for auditing and detecting your users' activity, or see the for a comprehensive guide on the benefits of these features and other recommendations.

  1. or for your .

  2. .

These guides provide step-by-step instructions for discovering, classifying, and tagging your data.

  1. .

  2. to configure and validate SDD.

  3. to discover entities of interest for your policy needs.

  4. .

These guides provide step-by-step instructions for configuring and securing your data with governance policies, or see the for a comprehensive guide on creating policies to fit your organization's use case.

  1. .

  2. Validate the policy. You do not have to validate every policy you create in Immuta; instead, examine a few to validate the behavior you expect to see:

    1. Validate that the Immuta users impacted now have an Immuta role in Snowflake dedicated to them.

    2. Validate that when acting under the Immuta role those users have access to the table(s) in question.

Register your remaining tables at the schema level with schema monitoring turned on.

  • Implement classification to categorize and tag sensitive data.

  • Validate that users without access in Immuta can still access the table with a different Snowflake role that has access.

  • Validate that a user with SECONDARY ROLES ALL enabled retains access if

    • they were not granted access by Immuta and

    • they have a role that provides them access, even if they are not currently acting under that role.

  • Create a global data policy.

  • Validate that a user with a role that can access the table in question (whether it's an Immuta role or not) sees the impact of that data policy.

  • Once all Immuta policies are in place, remove or alter old roles.

  • Configure your Snowflake integration
    Snowflake table grants
    Snowflake low row access policy mode
    Snowflake query audit
    default subscription policy
    Integrate an IAM with Immuta
    Map external user IDs from Snowflake to Immuta
    Detect your user activity
    Detect use case
    Set up audit export to S3
    ADLS Gen2
    Snowflake audit logs
    View the Detect dashboards to see the activity of your registered users on registered tables
    Discover your data
    Enable sensitive data discovery (SDD)
    Register a subset of your tables
    Configure SDD
    Validate that the SDD tags are applied correctly
    Secure your data
    Secure use cases
    Create a global subscription policy