Security and Governance Flashcards

1
Q

How does Snowflake ensure data security?

A

Snowflake ensures data security through encryption, role-based access control, and network policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the key security features of Snowflake?

A

Key security features include encryption, multi-factor authentication, and network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you manage users in Snowflake?

A

Users in Snowflake are managed through the creation of user accounts and assignment of roles and permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of roles in Snowflake?

A

Roles in Snowflake are used to grant and manage access privileges to database objects and operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you create and assign roles in Snowflake?

A

Roles can be created using the CREATE ROLE command and assigned to users using the GRANT ROLE command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the use of network policies in Snowflake.

A

Network policies in Snowflake control the IP addresses that are allowed to connect to Snowflake, enhancing security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does Snowflake handle data encryption?

A

Snowflake handles data encryption by encrypting data at rest and in transit using strong encryption algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of the ACCOUNTADMIN role?

A

The ACCOUNTADMIN role in Snowflake is a powerful role with full administrative privileges over the Snowflake account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you manage access controls in Snowflake?

A

Access controls in Snowflake are managed using roles and grants to define who can access which resources and perform which actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the best practices for securing data in Snowflake?

A

Best practices include using strong encryption, implementing role-based access control, and regularly auditing access logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does Snowflake support regulatory compliance?

A

Snowflake supports regulatory compliance by providing features such as encryption, access controls, and audit logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the role of multi-factor authentication (MFA) in Snowflake?

A

Multi-factor authentication (MFA) enhances security by requiring users to provide two or more verification factors to access their accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you monitor security events in Snowflake?

A

Security events in Snowflake can be monitored using ACCOUNT_USAGE views, security integrations, and audit logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the use of resource monitors in Snowflake.

A

Resource monitors in Snowflake help track and control the consumption of compute resources, preventing excessive usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of the GRANT and REVOKE commands?

A

The GRANT and REVOKE commands are used to assign and remove privileges on database objects to roles and users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do you audit user activities in Snowflake?

A

User activities in Snowflake can be audited using ACCOUNT_USAGE views and event logging to track access and changes.

17
Q

What are the different types of security policies in Snowflake?

A

Security policies in Snowflake include network policies, access control policies, and data encryption policies.

18
Q

How does Snowflake ensure data governance?

A

Snowflake ensures data governance through role-based access control, data auditing, and compliance features.

19
Q

What is the purpose of the INFORMATION_SCHEMA in Snowflake?

A

The INFORMATION_SCHEMA in Snowflake provides metadata about the database objects, such as tables, columns, and privileges.

20
Q

How do you handle data privacy requirements in Snowflake?

A

Data privacy requirements in Snowflake are handled by implementing strong access controls, encryption, and auditing capabilities.