top of page
  • Writer's pictureTim Burns

Glad to Report I wasn't Hacked on my Vacation


But I am reviewing database security protocols, starting with this article from Oracle

Securing data is the first thing every Data Architect thinks about when setting up a new database, but systems degrade over time, and security becomes more complex, the more data we have.

Snowflake, my database of choice, is particularly challenging because

  • It is cloud-only

  • Is accessible to the internet

  • Requires trust relationships with cloud providers.

Checklists are an excellent method to establish consistency and quality on a repeated process. Security is not a "set it and forget it" process and requires continual diligence and adaptation to change. In that way, it is fundamentally agile: You better be able to respond to change, because the security profile of your data is changing all the time.

In my new initiative, I will be outlining practical checklist and automated methods for Snowflake Data Security including:

  1. Assessment - Build actionable reports on the current state of your data security

  2. Detection - How can you automate intrusion detection

  3. Prevention - How to prevent unauthorized access to data

  4. Data Security - Secure the data at the fundamental levels

  5. User Authentication - Validating the identity of users

  6. User Authorization - Defining Roles and Privileges of users and Groups

It's a large checklist and one I'm hoping will keep me busy writing and learning. Hope you enjoy following me.

15 views0 comments

Recent Posts

See All

Yes, there are. They are much better than me. I would be surprised if anyone read this blog. That's not true: I read this blog and here are some entries I'm leaving for myself. I spend at least 4

bottom of page