Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

How to Enhance Snowflake Data Sharing Environments Securely

Listen to the content

This post is also available in: Brazilian Portuguese

Snowflake's cloud native data architecture allows users to easily create shares and materialized views without making copies.  The Snowflake Marketplace makes it easier than ever to access external third party data to share as well.

Sharing data can speed up innovation, drive growth and help avoid risks, but it can be challenging. The larger the organization and the more diverse the data sources - the higher the risk that data sharing can cause more problems than it solves.

What are those problems?  If you are CISO, you worry that any analyst in the firm could accidentally share sensitive data and unprotected personal data causing fiscal and reputational harm. What is in the data to start with, and who is actually allowed to share it under what circumstances?  Also, what if you implement several rules for data sharing? You worry that if you mandate complex data sharing and access policies across teams and lines of business, you will end up with different data masking policies in different teams and a siloed approach that delivers varied results to auditors and 3rd parties.

If you are CDO, you worry that you must clearly understand what sensitive data exists in Snowflake now and as it migrates into the environment.  Humans who know the data are few and far between - you need AI to tell you what sensitive information is in the data so your CISO can protect it.

So for data protectors and data policy leads, if you want to get the best out of Snowflake's data sharing, you want 1) a capability that uses AI to id and label all the data with high accuracy, 2) you want a Data Command Center plane that provides granular access policy creation and enforcement that is the same for Snowflake as it is for every other system, line of business and user; and finally, 3) you want an automated way to set up workflows and remediation so data sharing can happen without friction for end users.

Securiti and Snowflake work together to ensure that all obligations around sensitive data in your Snowflake data sharing environment are met. Securiti leverages automation around sensitive data insight, governance, and masking. When this automation is embedded into your Snowflake sharing environment, it provides continuous, autonomous protection of your shared data.

Understand Shared Sensitive Data

Securiti’s Sensitive Data Intelligence scans all of the data that exists with Snowflake. It automatically detects and classifies sensitive data, including sensitive data elements such as medical identifiers, financial information and more.  The solution automatically applies metadata tags and labels sensitive data allowing you to track and enforce security policies on shared data.

Understand Roles and Users Accessing Shared Sensitive Data

Securiti’s Access Intelligence and Governance solution goes a step farther by providing deep insight into which users and roles are accessing sensitive data within your data shares. The solution delivers an overall picture of user access on your platform, including users and the roles they have, the tables accessed, data element types and data accessed. This insight provides you the information to better understand and protect your shared data, and put in place more secure sharing access models such as a least privileged access model.

Mask Shared Sensitive Data

Snowflake provides the foundational infrastructure within the platform to enable organizations to mask specific data within the platform. Masking data has a huge benefit in data sharing environments by enabling companies to share their data with users to drive business value without actually sharing specific sensitive data.  The goal of data masking in a Snowflake data sharing environment is to protect sensitive data, while providing a functional alternative when real data is not needed.

Securiti’s Data Access Intelligence and Governance solution simplifies and streamlines the data masking process for shared data in Snowflake.  The solution harnesses sensitive data classification and tags to create dynamic masking policies via a centralized policy engine, working in conjunction with Snowflake's native masking capabilities.

Any time data is added or changed within your Snowflake data sharing environment that has the same tags, it will be dynamically masked for the defined user or role.

Automate Access to Shared Data

Data shares in Snowflake utilize standard role-based access control that Snowflake provides for all objects in the system. With rapidly growing and changing Snowflake environments there is a need to automate the process of mapping users and roles to underlying sensitive data in data shares.

Securiti’s Data Access Intelligence and Governance provides the ability to automate role and user access in Snowflake based on an understanding of sensitive information in data shares. Policies can be created based on sensitive data element groups or tags vs. having to manually define access rights  at a row or column level. . If any data is added or changed within a store that is tagged, then data access restrictions will automatically apply to that updated or changed data.

Securiti can enhance your existing Snowflake data sharing environment by enabling your organization to:

  • Better secure and protect shared sensitive data with insight into sensitive data access
  • Implement automatic policies around Snowflake data masking
  • Streamline Snowflake user access management around sensitive data
  • Make your Snowflake data sharing environments more compliant to data privacy and protection regulations

Automate Data Access Governance for Snowflake

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share

More Stories that May Interest You
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Spotlight 13:32
Ensuring Solid Governance Is Like Squeezing Jello
Watch Now View
Latest
Shrink The Blast Radius: Automate Data Minimization with DSPM View More
Shrink The Blast Radius
Recently, DaVita disclosed a ransomware incident that ultimately impacted about 2.7 million people, and it’s already booked $13.5M in related costs this quarter. Healthcare...
Why I Joined Securiti View More
Why I Joined Securiti
I’m beyond excited to join Securiti.ai as a sales leader at this pivotal moment in their journey. The decision was clear, driven by three...
View More
EU Publishes Template for Public Summaries of AI Training Content
The EU released the Explanatory Notice and Template for the Public Summary of Training Content for General-Purpose AI (GPAI) Models. Learn more.
Decoding Saudi Arabia’s Cybersecurity Risk Management Framework View More
Decoding Saudi Arabia’s Cybersecurity Risk Management Framework
Discover the Kingdom of Saudi Arabia’s National Framework for Cybersecurity Risk Management by the NCA. Learn how TLP, risk assessment and proactive strategies protect...
View More
The Rise of AI in Financial Institutions: Realignment of Risk & Reward
Learn how AI is transforming financial institutions by reshaping risk management, regulatory compliance, and growth opportunities. Learn how organizations can realign risk and reward...
Redefining Data Privacy Careers in the Age of AI View More
Redefining Data Privacy Careers in the Age of AI
Securiti's whitepaper provides a detailed overview of the impact AI is poised to have on data privacy jobs and what it means for professionals...
7 Data Minimization Best Practices View More
7 Data Minimization Best Practices: A DSPM Powered Guide
Discover 7 core data minimization best practices in this DSPM-powered infographic checklist. Learn how to cut storage waste, automate discovery, detection and remediation.
Navigating the Minnesota Consumer Data Privacy Act (MCDPA) View More
Navigating the Minnesota Consumer Data Privacy Act (MCDPA): Key Details
Download the infographic to learn about the Minnesota Consumer Data Privacy Act (MCDPA) applicability, obligations, key features, definitions, exemptions, and penalties.
The DSPM Architect’s Handbook View More
The DSPM Architect’s Handbook: Building an Enterprise-Ready Data+AI Security Program
Get certified in DSPM. Learn to architect a DSPM solution, operationalize data and AI security, apply enterprise best practices, and enable secure AI adoption...
Gencore AI and Amazon Bedrock View More
Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock
Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...
What's
New