Trust Center overview¶
You can use the Trust Center to evaluate, monitor, and reduce potential security risks in your Snowflake accounts. The Trust Center evaluates each Snowflake account against recommendations that are specified in scanners. Scanners might generate findings. Trust Center findings provide information about how to reduce potential security risks in your Snowflake account. Not every scanner run generates a finding. A scanner run that finds no security concern generates no finding in the Trust Center. You can also use the Trust Center to configure proactive notifications that help you monitor your account for security risks.
Common Trust Center use cases¶
For more information about how to use the Trust Center to reduce security risks in your Snowflake account, see the following topics:
Encontrar usuários de risco e reduzir os riscos de autenticação.
Detect anomalous access.
Limitations¶
Snowflake reader accounts aren’t supported.
Required roles¶
To view or manage scanners and their findings by using the Trust Center, a user with the ACCOUNTADMIN role
must grant the SNOWFLAKE.TRUST_CENTER_VIEWER or SNOWFLAKE.TRUST_CENTER_ADMIN application role to your role.
The following table lists common tasks that you perform by using the Trust Center user interface, and the minimum application role that your role requires to perform those tasks:
Nota
If you are using the Trust Center in the organization account, use the GLOBALORGADMIN role, not ACCOUNTADMIN, to grant the Trust Center application roles.
Consulte a tabela a seguir para obter informações sobre quais funções de aplicativo são necessárias para acessar guias específicas no Trust Center:
Task |
Aba do Trust Center |
Minimum required application role |
Notes |
|---|---|---|---|
Detections |
|
|
|
Violations |
|
|
|
Violations |
|
None. |
|
Manage scanners |
|
None. |
|
Manage scanners |
|
None. |
|
Organization |
|
The Organization tab is visible only in an Organization account. |
You can create a custom role that provides view-only access to the Violations and Detections tabs. You can also create a separate, administrator-level role to manage violations and scanners by using the Violations and Manage scanners tabs. For example, to create these two different roles, run the following commands:
USE ROLE ACCOUNTADMIN;
CREATE ROLE trust_center_admin_role;
GRANT APPLICATION ROLE SNOWFLAKE.TRUST_CENTER_ADMIN TO ROLE trust_center_admin_role;
CREATE ROLE trust_center_viewer_role;
GRANT APPLICATION ROLE SNOWFLAKE.TRUST_CENTER_VIEWER TO ROLE trust_center_viewer_role;
GRANT ROLE trust_center_admin_role TO USER example_admin_user;
GRANT ROLE trust_center_viewer_role TO USER example_nonadmin_user;
Nota
This example isn’t intended to recommend a complete role hierarchy for using the Trust Center. For more information, see each sub-section in Uso do Trust Center.
Using private connectivity with Trust Center¶
O Trust Center oferece suporte à conectividade privada. Para obter mais informações, consulte Uso de conectividade privada.
Trust Center findings¶
Trust Center findings include two kinds of findings: violations and detections. Both findings are generated by scanners as they run in your Snowflake accounts.
You can review findings at the organization level or you can examine more closely the findings for a specific account.
Nota
Currently, you can’t view detection findings at the organization level.
Organization-level findings¶
The Organization tab provides insights into the violation findings that are generated in all of the accounts in the organization. This tab includes the following information:
O número de violações na organização.
As contas com as violações mais críticas.
O número de violações de cada conta na organização. Você pode selecionar uma conta para detalhar cada violação.
Nota
You can’t use the Organization tab to resolve or reopen violations. To perform these actions, sign in to the account with the violation, and then access the Violations tab.
Para acessar a guia Organization, você deve atender aos seguintes requisitos:
Faça login na conta da organização.
Use uma função que tenha a função de aplicativo ORGANIZATION_SECURITY_VIEWER. Você também deve ter uma função de aplicativo do Trust Center.
Descobertas no nível da conta¶
Verificadores find and report violations and detections findings through the Trust Center. A violation persists over time and represents a configuration that doesn’t conform with a scanner’s requirements. A detection occurs one time and represents a unique event. You can use the Trust Center to view and manage findings for your account. For more information, see Uso do Trust Center.
Violations¶
A scanner can examine an entity at any point and determine whether it is in violation based only on its current configuration. Scanners continue to report on violations unless you change the configuration to remediate the violations. For example, a scanner reports a violation if some users haven’t configured multi-factor authentication (MFA).
The Violations tab provides account-level information about scanner results. It includes the following information:
Um gráfico de violações de verificador ao longo do tempo, codificado por cores e por gravidade baixa, média, alta e crítica.
An interactive list for each violation that is found. Each row in the list contains details about the violation, when the scanner was last run, and how to remediate the violation.
As violações permitem que você identifique as configurações do Snowflake na conta que violam os requisitos dos pacotes de verificadores habilitados. Para cada violação, o Trust Center fornece uma explicação de como remediar a violação. Após corrigir uma violação, ela ainda aparecerá na guia Violations até que a próxima execução agendada do pacote de verificadores que contém o verificador que relatou a violação comece ou até que você execute o pacote de verificadores manualmente.
When you are signed in to the account with the violations, you can use the Violations tab to perform the following actions:
Faça a triagem das violações que se aplicam a você e registre as evidências ou notas de progresso.
Resolva ou reabra as violações por qualquer motivo e registre a justificativa para as necessidades de auditoria.
Sort or filter violations by severity, scanner package, scanner version, scanned time, updated time, or status.
Adicione motivos para uma alteração de status de violação para fornecer um registro claro das ações tomadas.
You can remediate violations by changing the configuration. For a violation, the Trust Center provides suggestions for remediation. After you remediate the issue, the Trust Center no longer reports the violation. You can also manage the lifecycle of a violation finding by changing its status to Resolved. Email notifications are suppressed for resolved violations. Suppression prevents more notifications while you work to remediate the underlying misconfigurations. A resolved violation finding no longer generates a notification.
Detections¶
A detection represents an event that happened at a specific time. The following findings are examples of events that might be reported as detections:
Login events originated from an unrecognized IP address.
A large amount of data was transferred to an external stage.
A task had a high error rate between two points in time.
Scanners report each detection based on an event trigger. For example, a scanner reports a detection when it detects a suspicious sign-in event and reports a separate detection when it detects another suspicious sign-in event at a different time. For a detection, the Trust Center provides information about the event. Because the event is unique and happened in the past, direct remediation of a detection isn’t possible.
Based on the information that the Trust Center provides, you can investigate whether the detection is meaningful. If the detection is meaningful, you can take actions to prevent similar events in the future.
Nota
If the scanner that reported the detection runs again, it might or might not report similar detections. Currently, you can’t manage the lifecycle of a detection.
For more information about managing detections, see View detections.
Verificadores¶
A scanner is a background process that checks your account for security risks that are based on the following criteria:
How you configured your account.
Anomalous events.
The Trust Center groups scanners into scanner packages. Scanner details provide information about what security risks the scanner checks for in your account, when the scanner runs, and who receives notifications about the scanner’s findings for your account. To see the details for a specific scanner, follow the instructions in View details for a scanner.
Schedule-based scanners¶
Schedule-based scanners run at specific times, according to their schedules. You must enable a scanner package before you can change the schedule for a scanner. For more information about changing the schedule for a scanner, see Change the schedule for a scanner.
Event-driven scanners¶
Event-driven scanners generate detections that are based on relevant events. Examples include scanners that detect sign-ins from unusual IP addresses and scanners that detect changes to sensitive parameters. You can’t schedule an event-driven scanner, because an event, not a schedule, drives the detection that an event-driven scanner generates. The Trust Center reports detections that are generated by event-driven scanners within an hour of the time that an event occurs.
An event-based scanner can detect events that a schedule-based scanner could miss. For example, consider a schedule-based scanner that detects
the TRUE or FALSE state of a Boolean parameter once every 10 minutes. Toggling — that is, changing the state of — the value of
that parameter from TRUE to FALSE, and then back to TRUE again before 10 minutes pass would occur undetected by the
schedule-based scanner. An event-based scanner that detects each state change would detect both events.
For a current list of event-driven scanners, see Pacote de verificadores Threat Intelligence.
Nota
Event-driven scanners might appear as multiple items in the Exibição METERING_HISTORY.
Scanner Packages¶
Scanner packages contain a description and a list of scanners that run when you enable the scanner package.
After you enable a scanner package, the scanner package runs immediately, regardless of the configured schedule. After you enable a scanner
package, you can enable or disable individual scanners in the scanner package. Your role must have the SNOWFLAKE.TRUST_CENTER_ADMIN application role to manage scanners
by using the Manage scanners tab. For more information, see Required roles.
Os seguintes pacotes de verificadores estão disponíveis:
For information about enabling scanner packages, the cost that can occur from enabled scanners, how to change the schedule for a scanner package, and how to view the list of current scanners in a package, see the following topics:
Scanner packages are deactivated by default, except for the Pacote de verificadores Segurança Básica.
Pacote de verificadores Segurança Básica¶
The Security Essentials scanner package scans your account to check whether you have set up the following recommendations:
You have an authentication policy that enforces all human users to enroll in MFA if they use passwords to authenticate.
Todos os usuários humanos estão inscritos em MFA se usarem senhas para autenticação.
You set up an account-level network policy that was configured to only allow access from trusted IP addresses.
Você configurou uma tabela de eventos se sua conta habilitou o compartilhamento de eventos para um aplicativo nativo, para que sua conta receba uma cópia das mensagens de log e das informações de eventos que são compartilhadas com o provedor de aplicativos.
This scanner package only scans users that are human users; that is, user objects with a TYPE property of PERSON or NULL. For more information, see Tipos de usuários.
The Security Essentials scanner package:
Is enabled by default. You can’t deactivate it.
Runs once a month. You can’t change this schedule.
Is a free scanner package that doesn’t incur serverless compute cost.
Pacote de verificadores de Benchmarks CIS¶
Você pode acessar insights de segurança adicionais ativando o pacote de verificadores Benchmarks CIS, que contém verificadores que avaliam sua conta em relação aos Benchmarks do Center for Internet Security (CIS) do Snowflake. Os CIS Snowflake Benchmarks são uma lista de práticas recomendadas para configurações de conta Snowflake destinadas a reduzir vulnerabilidades de segurança. Os CISSnowflake Benchmarks foram criados por meio da colaboração da comunidade e do consenso entre especialistas no assunto.
Para obter uma cópia dos CIS Snowflake Benchmarks, consulte o site dos CIS Snowflake Benchmarks.
As recomendações encontradas nos CIS Snowflake Benchmarks são numerados por seção e recomendação. Por exemplo, a primeira recomendação da primeira seção é numerada como 1.1. Na aba Violations, o Trust Center fornece números de seção para cada violação se você quiser fazer referência aos CIS Snowflake Benchmarks.
Por padrão, esse pacote de verificadores é executado uma vez por dia, mas você pode alterar o cronograma.
For information about enabling scanner packages, the cost that can occur from enabled scanners, how to change the schedule for a scanner package, and how to view the list of current scanners in a package, see the following topics:
Nota
Para benchmarks CIS específicos do Snowflake, o Snowflake apenas determina se você implementou uma medida de segurança específica, mas não avalia se a medida de segurança foi implementada de uma forma que atinja seu objetivo. Para esses parâmetros de comparação, a ausência de violação não garante que a medida de segurança seja implementada de maneira eficaz. Os seguintes parâmetros de comparação não avaliam se suas implementações de segurança foram implementadas de forma a alcançar seu objetivo, ou o Trust Center não realiza verificações para elas:
Toda a seção 2: garanta que as atividades sejam monitoradas e forneça recomendações para configurar o Snowflake para tratar das atividades que exigem atenção. Esses verificadores contêm consultas complexas cujas violações não aparecem no console do Snowsight.
Um oficial de segurança pode obter informações valiosas dos verificadores da seção 2 executando a seguinte consulta na visualização
snowflake.trust_center.findings:SELECT start_timestamp, end_timestamp, scanner_id, scanner_short_description, impact, severity, total_at_risk_count, AT_RISK_ENTITIES FROM snowflake.trust_center.findings WHERE scanner_type = 'Threat' AND completion_status = 'SUCCEEDED' ORDER BY event_id DESC;
Na saída, a coluna
AT_RISK_ENTITIEScontém o conteúdo JSON com detalhes sobre as atividades que exigem revisão ou correção. Por exemplo, o verificador CIS_BENCHMARKS_CIS2_1 monitora concessões de privilégios elevados, e os agentes de segurança devem analisar cuidadosamente os eventos relatados por esse verificador, como o seguinte exemplo de evento:[ { "entity_detail": { "granted_by": joe_smith, "grantee_name": "SNOWFLAKE$SUSPICIOUS_ROLE", "modified_on": "2025-01-01 07:00:00.000 Z", "role_granted": "ACCOUNTADMIN" }, "entity_id": "SNOWFLAKE$SUSPICIOUS_ROLE", "entity_name": "SNOWFLAKE$SUSPICIOUS_ROLE", "entity_object_type": "ROLE" } ]
O Snowflake sugere as seguintes práticas recomendadas para verificadores de seção 2:
Não desative os verificadores da seção 2, a menos que você tenha certeza de que possui medidas de monitoramento suficientes.
Inspect the violations of section 2 scanners on a regular cadence or configure a monitoring task for detections. Specifically, configure monitoring as described in the
SUGGESTED_ACTIONcolumn of thesnowflake.trust_center.findingsview.
3.1: Ensure that an account-level network policy was configured to only allow access from trusted IP addresses. Trust Center displays a violation if you don’t have an account-level network policy, but doesn’t evaluate whether the appropriate IP addresses have been allowed or blocked.
4.3: certifique-se de que o parâmetro DATA_RETENTION_TIME_IN_DAYS esteja definido como 90 para dados críticos. O Trust Center exibirá uma violação se o parâmetro DATA_RETENTION_TIME_IN_DAYS associado ao Time Travel não estiver definido como 90 dias para a conta ou pelo menos um objeto, mas não avalia quais dados são considerados críticos.
4.10: certifique-se de que o mascaramento de dados esteja habilitado para dados confidenciais. O Trust Center exibe uma violação se a conta não tiver pelo menos uma política de mascaramento, mas não avalia se os dados confidenciais estão protegidos adequadamente. O Trust Center não avalia se uma política de mascaramento está atribuída a pelo menos uma tabela ou exibição.
4.11: certifique-se de que as políticas de acesso a linhas estejam configuradas para dados confidenciais. O Trust Center exibe uma violação se a conta não tiver pelo menos uma política de acesso a linhas, mas não avalia se os dados confidenciais estão protegidos. O Trust Center não avalia se uma política de acesso a linhas está atribuída a pelo menos uma tabela ou exibição.
Pacote de verificadores Threat Intelligence¶
Você pode acessar insights de segurança adicionais no Trust Center habilitando o pacote de verificadores Threat Intelligence. Esse pacote identifica riscos com base nos seguintes critérios:
Tipos de usuários: Se um usuário da conta Snowflake é um humano ou um serviço.
Authentication methods or policies: Whether a user logs in to their account with a password without being enrolled in MFA.
Atividade de login: se um usuário não fez login recentemente.
Taxas de falha anormais: se um usuário tem um alto número de falhas de autenticação ou erros de trabalho.
New! Detection findings: all new scanners that report detection findings.
Specific scanners in the Threat Intelligence package identify users that demonstrate potentially risky behavior as risky. The following table provides examples:
Threat Intelligence scanners¶
Scanner |
Type |
Description |
|---|---|---|
Migrate human users away from password-only sign-in |
Schedule-based |
Identifies human users who (a) haven’t set up MFA and signed in with a password at least once in the past 90 days and (b) have a password but haven’t set up MFA and haven’t signed in for 90 days. |
Migrate legacy service users away from password-only sign-in |
Schedule-based |
Identifies legacy service users who have a password and (a) have signed in with only a password at least once in the past 90 days and (b) haven’t signed in for 90 days. |
Identify users with a high volume of authentication failures |
Schedule-based |
Identifies users with a high number of authentication failures or job errors, which might indicate attempted takeovers of an account, misconfigurations, exceeded quotas, or permission issues. Provides a risk-severity finding and a risk-mitigation recommendation. |
New Threat Intelligence scanners¶
Both schedule-based scanners and event-based scanners can report detections. This preview adds new scanners of both types. All of the added scanners generate detections instead of violation findings.
This preview adds the following new scanners to the Pacote de verificadores Threat Intelligence:
Scanner |
Type |
Description |
|---|---|---|
Authentication policy changes |
Event-driven |
Finds changes to authentication polices at both the account level and the user level. |
Dormant user sign-ins |
Event-driven |
Analyzes sign-in history events and flags sign-ins from users who haven’t signed in during the last 90 days. |
Entities with long-running queries |
Schedule-based |
Finds users and query IDs associated with long-running queries, which are queries with durations that are two standard deviations away from an average query duration over the last 7 days, or the last time the scanner ran, whichever is more recent. We recommend setting this scanner to run once a day. This scanner might cost more initially, as it builds a 30-day cache, which it stores thereafter. Trust Center reports a detection event the first time this scanner runs. |
Login protection |
Event-driven |
Finds recent logins from unusual IP addresses. Importante These events originate from the Malicious IP Protection service and require immediate attention. |
Sensitive parameter protection |
Event-driven |
Reports disablement of the following sensitive account-level parameters: PREVENT_UNLOAD_TO_INLINE_URL,
REQUIRE_STORAGE_INTEGRATION_FOR_STAGE_CREATION, and REQUIRE_STORAGE_INTEGRATION_FOR_STAGE_OPERATION.
This scanner only reports detections of a change from |
Users with administrator privileges |
Schedule-based |
Finds newly created users whose default role is an administrator role, as well as recent grants to existing users that grant them an administrator role. |
Users with unusual applications used in sessions |
Schedule-based |
Finds users who have used unusual client applications that connect to Snowflake. |
O pacote de verificadores Threat Intelligence é executado uma vez por dia por padrão, mas você pode alterar o cronograma.
For information about enabling scanner packages, the cost that can occur from enabled scanners, how to change the schedule for a scanner package, and how to view the list of current scanners in a package, see the following topics:
