Using the Trust Center¶
This topic describes how to monitor Trust Center costs, and manage scanners, findings, and security risks by using the Trust Center Snowsight interface.
Monitoring cost¶
The Trust Center incurs serverless compute cost when it scans your Snowflake environment for security vulnerabilities.
You can use cost-related views in the ACCOUNT_USAGE and ORGANIZATION_USAGE schemas to track the costs associated with the Trust Center. When
querying these views, filter on the service_type column to find TRUST_CENTER values.
View |
Schema |
|
Roles with required privileges |
|---|---|---|---|
ACCOUNT_USAGE |
TRUST_CENTER |
|
|
ACCOUNT_USAGE |
TRUST_CENTER |
|
|
ORGANIZATION_USAGE |
TRUST_CENTER |
|
|
ORGANIZATION_USAGE |
TRUST_CENTER |
|
Example: View the total cost that the Trust Center incurred between December 1, 2024 and December 31, 2024.
Example: View the daily cost that the Trust Center incurred after December 1, 2024.
For information about how many credits are charged per Compute-Hour for the operation of the Trust Center, see Table 5 in the Snowflake Service Consumption Table.
Use the Trust Center Snowsight interface¶
This preview introduces several changes to the Trust Center. The Trust Center Snowsight interface now has the following tabs:
Overview - Displays a high-level summary of Trust Center findings for your account. Select the View option in each section of Overview to see more detailed information about a specific aspect of your account’s security posture.
Violations - This tab was previously named the Findings tab. It shows violations, suggests remediation actions for them, and provides detailed information about them. For information about using this tab, go to the Violations tab, and then follow the instructions in Manage the violation findings lifecycle and Manage security risks.
Detections - This tab shows the detections found by the scanners and provides information about them. For information about using this tab, see View Trust Center detection findings.
Manage scanners - Now contains the Scanner packages tab. You can use it to view and manage scanner packages and individual scanners. The event-driven scanners added in this preview show Event driven in the SCHEDULE column. For information about using this tab, go to the Manage scanners tab, and then follow the instructions in Manage scanner packages and Managing scanners.
Manage scanners - Now contains the Extensions tab. You can create Trust Center extensions by using the Snowflake Native App Framework. For more information, see, Using Trust Center extensions.
Manage scanner packages¶
You can complete the following tasks to manage scanner packages in the Trust Center:
View the list of scanners in a package¶
To view the list of scanners provided in a scanner package, follow these steps:
Sign in to Snowsight.
Switch to a role with the
SNOWFLAKE.TRUST_CENTER_ADMINapplication role granted to it.For more information about granting this role, see Required roles.
In the navigation menu, select Governance & security » Trust Center.
Select the Manage scanners tab.
From the list, select a scanner package.
Enable scanner packages¶
To enable a scanner package, follow these steps:
Sign in to Snowsight.
Switch to a role with the
SNOWFLAKE.TRUST_CENTER_ADMINapplication role granted to it.For more information about granting this role, see Required roles.
In the navigation menu, select Governance & security » Trust Center.
Select the Manage scanners tab.
Select a scanner package from the list.
Select Enable Package.
After you enable a scanner package, you can enable or disable individual scanners in the scanner package.
View available scanner packages¶
To view available scanner packages, follow these steps:
Sign in to Snowsight.
Switch to a role with the
SNOWFLAKE.TRUST_CENTER_ADMINapplication role granted to it.For more information about granting this role, see Required roles.
In the navigation menu, select Governance & security » Trust Center.
Select the Manage scanners tab.
Optionally, select Provider, Status, or Search to filter the list of scanner packages available.
Change the schedule for a scanner package¶
You can change the schedule for all scanner packages, except the Security Essentials scanner package.
Tip
After a scanner package is enabled, you can change the schedule for individual scanners in the scanner package.
To change the schedule for a scanner package, follow these steps:
Ensure you’ve enabled the CIS Benchmarks scanner package.
Sign in to Snowsight.
Switch to a role with the
SNOWFLAKE.TRUST_CENTER_ADMINapplication role granted to it.For more information about granting this role, see Required roles.
In the navigation menu, select Governance & security » Trust Center.
Select the Manage scanners tab.
Select a scanner package from the list.
Select the Settings tab.
Set your desired Frequency.
Select Continue.
Run a scanner package on demand¶
To run a scanner package on demand, follow these steps:
Sign in to Snowsight.
Switch to a role with the
SNOWFLAKE.TRUST_CENTER_ADMINapplication role granted to it.For more information about granting this role, see Required roles.
In the navigation menu, select Governance & security » Trust Center.
Select the Manage scanners tab.
Select a scanner package from the list.
Managing scanners¶
You can complete the following tasks to manage scanners in the Trust Center:
View details for a scanner¶
To view details that describe what each scanner does, follow these steps:
Sign in to Snowsight.
Switch to a role with the
SNOWFLAKE.TRUST_CENTER_ADMINapplication role granted to it.For more information about granting this role, see Required roles.
In the navigation menu, select Governance & security » Trust Center.
Select the Manage scanners tab.
Select a scanner package from the list.
Select a scanner from the list of scanner names.
Enable or disable a scanner in a scanner package¶
Attention
Scanners provide valuable information about possible security risks at a minimal cost. Before disabling a scanner, we recommend evaluating the value of the information provided by the scanner in relation to the cost associated with running it. For more information about evaluating the cost associated with a scanner, see Monitoring cost.
If a scanner package is disabled, all of the scanners in the package are disabled, including scanners that were enabled individually.
To enable or disable a scanner in a scanner package, follow these steps:
Sign in to Snowsight.
Switch to a role with the
SNOWFLAKE.TRUST_CENTER_ADMINapplication role granted to it.For more information about granting this role, see Required roles.
In the navigation menu, select Governance & security » Trust Center.
Select the Manage scanners tab.
Select a scanner package from the list.
In the scanner STATE, enable or disable the scanner.
In the confirmation box, select Confirm.
Change the schedule for a scanner¶
You can change the schedule for schedule-based scanners. You can’t change the schedule for event-based scanners. You can only enable or disable an event-driven scanner.
Note
When a custom schedule is set for an individual scanner, that setting is used instead of its scanner package schedule, even if the scanner package schedule is changed.
To change the schedule for a scanner, follow these steps:
Ensure that you enabled the scanner.
Sign in to Snowsight.
Switch to a role with the
SNOWFLAKE.TRUST_CENTER_ADMINapplication role granted to it.For more information about granting this role, see Required roles.
In the navigation menu, select Governance & security » Trust Center.
Select the Manage scanners tab.
Select a scanner package from the list.
Set your desired Frequency.
Select Save.
Reset the schedule for a scanner to the scanner package schedule¶
To change the schedule for a scanner to match its scanner package schedule, follow these steps:
Ensure that you enabled the scanner.
Sign in to Snowsight.
Switch to a role with the
SNOWFLAKE.TRUST_CENTER_ADMINapplication role granted to it.For more information about granting this role, see Required roles.
In the navigation menu, select Governance & security » Trust Center.
Select the Manage scanners tab.
Select a scanner package from the list.
Select Reset, and then select Reset to scanner package schedule.
Select Save.
Run a scanner on demand¶
To run a scanner on demand, follow these steps:
Ensure that you enabled the scanner.
Sign in to Snowsight.
Switch to a role with the
SNOWFLAKE.TRUST_CENTER_ADMINapplication role granted to it.For more information about granting this role, see Required roles.
In the navigation menu, select Governance & security » Trust Center.
Select the Manage scanners tab.
Select a scanner package from the list.
Manage the violation findings lifecycle¶
Specific application roles allow you to view and manage violation findings by using the Violations tab. For more information, see Required roles.
View violations¶
To view and filter your violations data to see your current progress, follow these steps:
Sign in to Snowsight.
Switch to a role with the
SNOWFLAKE.TRUST_CENTER_VIEWERapplication role granted to it.For more information about granting this role, see Required roles.
In the navigation menu, select Governance & security » Trust Center.
Select the Violations tab.
To view the list of open, muted, or all violations, select an option from the Status drop-down menu.
To see a detailed pane with the violation’s summary, recommendations, and activity, select any violation.
In the violation bar, select Activity to see the comments history and the responsible users.
To see the scanner’s last run and when the violation was generated, select Scanned.
To see when the violation status was last changed, select Updated.
Change the status of a violation finding¶
Attention
Marking a violation as Muted is a way to triage the open violation so you can focus on the ones most important for your environment.
Muting a violation also ceases the periodic email notifications for that violation. Scanners still run as scheduled irrespective of the
violation status: Open or Muted. The scanner continues to run and detect violations if the configuration remains unchanged.
All new security violations are raised with an Open status. You can mute a violation for multiple reasons, such as not being applicable
to your account, being deferred for a future date, being in progress already, or another reason.
You can change the status of a violation for any reason, such as not being applicable to your account, deferred for a future date, being in progress already, or another reason. To change the status of a violation, follow these steps:
Sign in to Snowsight.
Switch to a role with the
SNOWFLAKE.TRUST_CENTER_ADMINapplication role granted to it.For more information about granting this role, see Required roles.
In the navigation menu, select Governance & security » Trust Center.
Select the Violations tab.
Select a violation that opens its detailed pane. By default, only violations with the Open status are shown.
Select the Mute notification button.
(Optional) To justify the resolution, add a comment.
Select Submit.
You can reopen a muted violation by selecting the Unmute button.
Note
Manually muting a violation finding isn’t mandatory for customers. The Trust Center automatically removes violation findings from the Violations tab when a scanner run determines that any misconfiguration was corrected or remediation steps were followed correctly.
Remediate violations with Cortex Code¶
You can use Cortex Code to get AI-guided remediation for Trust Center violations directly in Snowsight. When you select Begin Remediation for a finding, Cortex Code opens a chat that explains the violation in the context of your account, recommends remediation steps, and can execute remediation actions with your approval.
Cortex Code provides interactive, conversational remediation that is personalized to your account’s specific configuration. Unlike the static remediation instructions on the Remediation tab, Cortex Code can tailor its guidance based on the entities and configurations involved in the violation, answer follow-up questions, and generate SQL statements that you can review and run.
Prerequisites¶
To use Cortex Code for violation remediation, the following conditions must be met:
Cortex Code in Snowsight must be available for your account.
Your role must have the
SNOWFLAKE.TRUST_CENTER_ADMINapplication role granted to it. For more information about granting this role, see Required roles.Your role must have the
SNOWFLAKE.CORTEX_USERdatabase role granted to it.
Remediate a violation with Cortex Code¶
To remediate a violation by using Cortex Code, follow these steps:
Sign in to Snowsight.
Switch to a role with the
SNOWFLAKE.TRUST_CENTER_ADMINapplication role granted to it.For more information about granting this role, see Required roles.
In the navigation menu, select Governance & security » Trust Center.
Select the Violations tab.
Select a violation to open the findings detail panel, and select Begin Remediation, or select the Cortex icon in the list of violations.
Cortex Code opens in a chat panel on the right side of the screen. The chat is pre-populated with the context of the selected violation, including the violation type, severity, affected entities, and scanner details.
Review the explanation and remediation steps that Cortex Code provides. You can:
Ask follow-up questions to understand the violation in more detail.
Request alternative remediation approaches.
Ask Cortex Code to generate SQL statements for the remediation.
Review and run SQL statements directly from the chat.
After you complete the remediation, wait for the next scheduled scanner run or run the scanner on demand to verify that the root cause of the violation has been remediated. The Trust Center automatically removes the violation from the Violations tab after the scanner confirms the remediation. A remediated finding may appear as an open finding in Snowsight for up to 3 hours after the violation is remediated at the scanner is re-run.
Note
AI-guided remediation is available for violations only. Detections represent unique events that occurred in the past and don’t have direct remediation steps. However, you can use Cortex Code to investigate and plan a course of action for detection findings as well.
Considerations¶
Cortex Code generates remediation suggestions based on your account’s configuration and the details of the specific violation. Always review the suggested SQL statements before running them.
Some violations require actions outside of Snowflake, such as coordinating an organization-wide MFA policy change or investigating whether a login from an unrecognized IP address is legitimate. In these cases, Cortex Code explains the required steps but cannot execute them on your behalf.
After completing a remediation, you can verify the fix by running the scanner on demand rather than waiting for the next scheduled run. For more information, see Run a scanner package on demand.
View Trust Center detection findings¶
The Detections tab displays information about the detection findings reported by the Trust Center and lets you examine them:
Note
Currently, you can’t manage the lifecycle — that is, mute or reopen — a detection finding. Detection findings aren’t currently aggregated into the Organization account.
View detections¶
To view detections, follow these steps:
Sign in to Snowsight.
Switch to a role that has either the
SNOWFLAKE.TRUST_CENTER_ADMINapplication role or theSNOWFLAKE.TRUST_CENTER_VIEWERapplication role granted to it.For more information about granting these roles, see Required roles.
In the navigation menu, select Governance & security » Trust Center.
Select the Detections tab.
A chart displays information about detections in the specified time period. You can adjust filters to modify the detections displayed on the tab. See the next step for information about modifying filters.
The detections bar displays information about each detection, such as the detection type, entity type, entity name, and additional information.
To analyze the detections displayed on the tab, adjust the filters:
Detection Type - Clear the filter to show detections of any type, or select a type to show only detections of that type; for example, Abnormal Account Activities, Insecure Login, or Privilege Escalation.
Severity - Clear the filter to show detections of any severity, or select a severity to show only detections of that severity; for example, Critical, High, Medium, or Low.
Entity Type - Clear the filter to show detections for any entity type, or select an entity type to show only detections for that entity type; for example, QUERY, ROLE, or USER.
Reported By - Clear the filter to show detections reported by all scanners in the Security Essentials and Threat Intelligence scanner packages, or select a scanner package to only show detections reported by scanners in that scanner package.
Time Range - Clear the filter to show all detections that were reported at any time or select a time range to view detections reported in the selected time range.
To see a detailed pane with the detection’s summary, remediation recommendations, and activity, select any detection.
To open a worksheet with queries that you can run to get more information on the scanner output, on the Remediation tab, select Open a Worksheet.
Manage security risks¶
You can complete the following tasks to manage security risks in the Trust Center:
View security risks¶
To view security risks, follow these steps:
Sign in to Snowsight.
Switch to a role with the
SNOWFLAKE.TRUST_CENTER_VIEWERorSNOWFLAKE.TRUST_CENTER_ADMINapplication role granted to it.For more information about granting these roles, see Required roles.
In the navigation menu, select Governance & security » Trust Center.
Select the Violations tab.
Select a recommendation from the list of violations to view details about the violation associated with the recommendation.
Optionally, select Severity, Violations, or Search to filter the list of recommendations shown.
Remediate security risks¶
When viewing individual security risks, you can learn how to remediate the risks associated with the recommendations that display, allowing you to harden the security of your account.
To remediate security risks, follow these steps:
Sign in to Snowsight.
Switch to a role that has the
SNOWFLAKE.TRUST_CENTER_ADMINapplication role granted to it.For more information about granting these roles, see Required roles.
In the navigation menu, select Governance & security » Trust Center.
Select the Violations tab.
From the list of violations, select a recommendation.
In the Remediation tab, follow the steps that are shown.



