Snowflake Access Control
Apress (Verlag)
978-1-4842-8037-9 (ISBN)
Snowflake is increasingly the choice for companies looking to move to a data warehousing solution, and security is an increasing concern due to recent high-profile attacks. This book shows how to use Snowflake's wide range of features that support access control, making it easier to protect data access from the data origination point all the way to the presentation and visualization layer.Reading this book helps you embrace the benefits of securing data and provide valuable support for data analysis while also protecting the rights and privacy of the consumers and customers with whom you do business.
What You Will Learn
Identify data that is sensitive and should be restricted
Implement access control in the Snowflake Data Cloud
Choose the right access control paradigm for your organization
Comply with CCPA, GDPR, SOX, APPI, and similar privacy regulations
Take advantage of recognized best practices for role-based access control
Prevent upstream and downstream services from subverting your access control
Benefit from access control features unique to the Snowflake Data Cloud
Who This Book Is For
Data engineers, database administrators, and engineering managers who wantto improve their access control model; those whose access control model is not meeting privacy and regulatory requirements; those new to Snowflake who want to benefit from access control features that are unique to the platform; technology leaders in organizations that have just gone public and are now required to conform to SOX reporting requirements
Jessica Megan Larson was born and raised in a small town across the Puget Sound from Seattle, but now calls Oakland, California home. She studied cognitive science with a minor in computer science at University of California Berkeley. She thrives on mentorship, solving data puzzles, and equipping colleagues with new technical skills. Jessica is passionate about helping women and non-binary people find their place in the technology industry. She was the first engineer within the Enterprise Data Warehouse team at Pinterest, and additionally helps to develop fantastic women through Built By Girls. Previously, she wrangled data at Eaze and Flexport. Outside of work, Jessica spends her time soaking up the California sun playing volleyball on the beach or at the park.
Part I. Background.- 1. What is Access Control?.- 2. Data Types Requiring Access Control.- 3. Data Privacy Laws and Regulatory Drivers.- 4. Permission types.- Part II. Creating Roles.- 5. Functional Roles - What A Person Does.- 6. Team Roles - Who A Person Is.- 7. Assuming A Primary Role.- 8. Secondary Roles.- Part III. Granting Permissions to Roles.- 9. Role Inheritance.- 10. Account and Database Level Privileges.- 11. Schema-Level Privileges.- 12. Table and View Level Privileges.- 13. Row-Level Permissioning and Fine-Grained Access Control.- 14. Column-Level Permissioning and Data Masking.- Part IV. Operationally Managing Access Control.- 15. Secure Data Sharing.- 16. Separating Production from Development.- 17. Upstream & Downstream Services.- 18. Managing Access Requests.
Erscheinungsdatum | 10.03.2022 |
---|---|
Zusatzinfo | 69 Illustrations, black and white; XXII, 246 p. 69 illus. |
Verlagsort | Berkley |
Sprache | englisch |
Maße | 178 x 254 mm |
Themenwelt | Informatik ► Datenbanken ► Data Warehouse / Data Mining |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik | |
Mathematik / Informatik ► Mathematik | |
Schlagworte | Appi • ccpa • Data lakes • data masking • data privacy • data protection • Data Warehousing • Fine-Grained Access • gdpr • RBAC • Role based Access Control • Sarbanes-Oxley • security • Snowflake Data Cloud • SOX |
ISBN-10 | 1-4842-8037-7 / 1484280377 |
ISBN-13 | 978-1-4842-8037-9 / 9781484280379 |
Zustand | Neuware |
Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich