Snowflake Access Control
eBook - ePub

Snowflake Access Control

Mastering the Features for Data Privacy and Regulatory Compliance

  1. English
  2. ePUB (mobile friendly)
  3. Only available on web
eBook - ePub

Snowflake Access Control

Mastering the Features for Data Privacy and Regulatory Compliance

Book details
Table of contents
Citations

About This Book

Understand the different access control paradigms available in the Snowflake Data Cloud and learn how to implement access control in support of data privacy and compliance with regulations such as GDPR, APPI, CCPA, and SOX. The information in this book will help you and your organization adhere to privacy requirements that are important to consumers and becoming codified in the law. You will learn to protect your valuable data from those who should not see it while making it accessible to the analysts whom you trust to mine the data and create business value for your organization.
Snowflake is increasingly the choice for companies looking to move to a data warehousing solution, and security is an increasing concern due to recent high-profile attacks. This book shows how to use Snowflake's wide range of features that support access control, making it easier to protect data access from the data origination point all the way to the presentation and visualization layer.Reading this book helps you embrace the benefits of securing data and provide valuable support for data analysis while also protecting the rights and privacy of the consumers and customers with whom you do business. What You Will Learn

  • Identify data that is sensitive and should be restricted
  • Implement access control in the Snowflake Data Cloud
  • Choose the right access control paradigm for your organization
  • Comply with CCPA, GDPR, SOX, APPI, and similar privacy regulations
  • Take advantage of recognized best practices for role-based access control
  • Prevent upstream and downstream services from subverting your access control
  • Benefit from access control features unique to the Snowflake Data Cloud

Who This Book Is For
Data engineers, database administrators, and engineering managers who wantto improve their access control model; those whose access control model is not meeting privacy and regulatory requirements; those new to Snowflake who want to benefit from access control features that are unique to the platform; technology leaders in organizations that have just gone public and are now required to conform to SOX reporting requirements

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Snowflake Access Control by Jessica Megan Larson in PDF and/or ePUB format, as well as other popular books in Computer Science & Databases. We have over one million books available in our catalogue for you to explore.

Information

Publisher
Apress
Year
2022
ISBN
9781484280386

Table of contents

  1. Cover
  2. Front Matter
  3. Part I. Background
  4. Part II. Creating Roles
  5. Part III. Granting Permissions to Roles
  6. Part IV. Operationally Managing Access Control
  7. Back Matter