D1.5 - OUTLINE DATA GOVERNANCE CAPABILITES IN SNOWFLAKE Flashcards
1
Q
Data Masking
A
A column-level security feature that uses masking policies to selectively mask plain-text data in table and view columns at query time
2
Q
Dynamic Data Masking Features
A
- Snowflake supports masking policies as a schema-level object to protect sensitive data from unauthorized access while allowing authorized users to access sensitive data at query runtime
- This means that sensitive data in Snowflake is not modified in an existing table. Rather, when users execute a query in which a masking policy applies, the masking policy conditions determine whether unauthorized users see masked, partially masked, obfuscated, or tokenized data
- Masking policies as a schema-level object also provide flexibility in choosing a centralized, decentralized, or hybrid management approach
3
Q
Account Usage Views
A
ACCOUNT_USAGE schema contains views that display object metadata and usage metrics for YOUR account. It is generally similar to the information schema
4
Q
External Tokenization
A
- External tokenization enables accounts to tokenize data before loading it into Snowflake and detokenize the data at query run time.
- Tokenization is the process of removing sensitive data by replacing it with an undecipherable token
- External tokenization makes use of masking policies with external functions
5
Q
Secure Views
A
- Secure views are only displayed to authorized users (i.e. users who have been granted the role that owns the view).
- if an unauthorized user uses any of the following commands or interfaces, the view definition is not displayed:
- SHOW VIEWS or SHOW MATERIALIZED VIEWS
- GET_DDL
- VIEWS information schema
- VIEWS account usage view
- View security can be integrated with Snowflake users and roles using CURRENT_ROLE and CURRENT_USER functions