
Snowflake Access Control: Mastering the Features for Data Privacy and Regulatory Compliance
Jessica Megan Larson
Résumé
Snowflake is increasingly the choice for companies looking to move to a data warehousing solution, and security is an increasing concern due to recent high-profile attacks. This book shows how to use Snowflake's wide range of features that support access control, making it easier to protect data access from the data origination point all the way to the presentation and visualization layer. Reading this book helps you embrace the benefits of securing data and provide valuable support for data analysis while also protecting the rights and privacy of the consumers and customers with whom you do business.
What You Will Learn
- Identify data that is sensitive and should be restricted
- Implement access control in the Snowflake Data Cloud
- Choose the right access control paradigm for your organization
- Comply with CCPA, GDPR, SOX, APPI, and similar privacy regulations
- Take advantage of recognized best practices for role-based access control
- Prevent upstream and downstream services from subverting your access control
- Benefit from access control features unique to the Snowflake Data Cloud
Who This Book Is For
Data engineers, database administrators, and engineering managers who want to improve their access control model; those whose access control model is not meeting privacy and regulatory requirements; those new to Snowflake who want to benefit from access control features that are unique to the platform; technology leaders in organizations that have just gone public and are now required to conform to SOX reporting requirements
Part II. Creating Roles 5. Functional Roles - What A Person Does6. Team Roles - Who A Person Is7. Assuming A Primary Role8. Secondary Roles
Part III. Granting Permissions to Roles 9. Role Inheritance10. Account and Database Level Privileges 11. Schema-Level Privileges12. Table and View Level Privileges13. Row-Level Permissioning and Fine-Grained Access Control14. Column-Level Permissioning and Data Masking
Part IV. Operationally Managing Access Control 15. Secure Data Sharing16. Separating Production from Development17. Upstream & Downstream Services18. Managing Access Requests
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Apress |
Auteur(s) | Jessica Megan Larson |
Parution | 02/03/2022 |
Nb. de pages | 246 |
EAN13 | 9781484280379 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse