Monitor and Secure Sensitive Data Platform Query Activity
Last updated
Was this helpful?
Last updated
Was this helpful?
This guide is for users who wish to understand their data estate and where there may be security gaps or non-compliant user query activity that needs to be addressed. It also contains details for configuring Immuta.
This use case is tailored to quickly get you monitoring queries in your data platform and understanding where you may have security gaps using Immuta Discover and Immuta Detect. If you are not using Snowflake, instead move to the use case because filtering by tags and sensitivity in Immuta Detect is currently only available on Snowflake.
As part of this use case, you will learn special considerations and configurations for setting up Immuta for Immuta Detect. Upon completion, you will understand existing security gaps.
Follow these steps to configure Immuta and start using Detect:
Configure your users in Immuta, using the in order to review and summarize user activity and plan your first policy.
Read the and connect Immuta to your database. Consider the .
in order to review and summarize data activity and plan your first policy.
Start . To get the most out of it, consider populating sensitivity using (SDD) and then .