Use the Trust Center to set up sensitive data classification¶
Trust Center lets you set up sensitive data classification in the Snowsight user interface, so you don’t have to write any SQL code. After it is set up, sensitive data classification automatically identifies which data in a database is sensitive and needs to be protected.
Get started¶
Note
The following steps apply only to the first user who accesses the Data Security tab in the Trust Center. If you aren’t the first user and want to set up classification, see Set up classification with advanced settings.
To use a web interface to set up sensitive data classification, complete the following steps:
Sign in to Snowsight as a user with the required privileges.
In the navigation menu, select Governance & security » Trust Center.
Select the Data Security tab.
Select Get started.
In the Set up auto-classification dialog, do the following:
Select the databases that you want to classify.
Specify whether you want to auto-apply tags instead of just recommending them. For more information about tags and categories, see Core concepts of sensitive data classification.
Select Enable.
Select Close.
Based on this default set up, sensitive data classification has the following behavior:
Reclassifies previously classified objects every 30 days.
Scans data for all native semantic categories.
Excludes views from classification.
Bases classification on a sample of up to 10,000 randomly selected rows per table.
When the classification process is complete, you are ready to view the results.
Set up classification with advanced settings¶
To set up sensitive data classification with advanced settings, complete the following steps:
Sign in to Snowsight as a user with the required privileges.
In the navigation menu, select Governance & security » Trust Center.
Select the Data Security tab.
Select Settings.
Do one of the following:
If you’re fine-tuning existing classification settings, find the classification profile that contains the settings and select
» Edit. If the first person to set up classification chose the default settings during
setup, the profile is Default Snowflake profile.If you are creating a new classification profile so different databases can be classified with different settings, select Create New.
Select the databases that you want to scan for sensitive data.
If a database is greyed out, it’s associated with an existing classification profile and is already being classified. You’ll need to edit the existing classification profile to remove the database before you can classify it with the settings of a new profile.
Select Next.
If your account classifies sensitive data into custom categories, select the ones that you want to use.
Select Next.
If you don’t want tags automatically applied to columns containing sensitive data, deselect Auto-apply tags.
If you want to apply a user-defined tag in addition to a system tag on matching columns, do the following:
In the Tag to apply column, select the user-defined tag/value pair that you want applied to sensitive data.
In the Detected semantic categories column, select values of the
SNOWFLAKE.CORE.SEMANTIC_CATEGORYtag. These can be native and custom semantic categories.
For example, if you select
PII = CONFIDENTIALas the user-defined tag/value pair in Tag to apply, and then select theNAMEsemantic category in Detected semantic categories, when Snowflake assigns theSNOWFLAKE.CORE.SEMANTIC_CATEGORY = NAMEsystem tag to a column, it also applies thePII = CONFIDENTIALtag.Select Next.
Specify the database, schema, and name of the classification profile where all of your settings will be saved.
Select the cadence at which previously classified objects are re-classified.
Specify if you want to exclude certain objects from the classification process. For information about excluding specific objects, see Excluding data from sensitive data classification.
Select Enable.
Classify additional databases¶
You can classify additional databases with the same classification settings by editing an existing classification profile. To edit a classification profile:
Sign in to Snowsight as a user with the required privileges.
In the navigation menu, select Governance & security » Trust Center.
Select the Data Security tab.
Select Settings.
Find the classification profile in the list and select
» Edit. If the first person to set up classification used the default settings, the classification profile is Default Snowflake profile.On the first page that appears, select the additional databases.
Complete the setup.
Next steps¶
To view the results of sensitive data classification, see Use the Trust Center to view results.
Access control requirements¶
Task |
Required privileges/roles |
Notes |
|---|---|---|
Set up classification for a database |
One of the following:
|
If you don’t want someone accessing other parts of Trust Center, grant the DATA_SECURITY_ADMIN role. |
EXECUTE AUTO CLASSIFICATION privilege on ACCOUNT |
||
APPLY TAG privilege on ACCOUNT |
||
USAGE on the database |
More powerful privileges on the database meet this requirement. |
|
Review classification insights and classified objects |
One of the following:
|
If you don’t want someone accessing other parts of Trust Center, grant the DATA_SECURITY_VIEWER or DATA_SECURITY_ADMIN role. |
Example: Allow a user to set up classification
To allow user mary to set up sensitive data classification and review classification findings, run the following commands:
USE ROLE ACCOUNTADMIN;
CREATE ROLE data_security_admin_role;
GRANT APPLICATION ROLE SNOWFLAKE.DATA_SECURITY_ADMIN TO ROLE data_security_admin_role;
GRANT EXECUTE AUTO CLASSIFICATION ON ACCOUNT TO ROLE data_security_admin_role;
GRANT APPLY TAG ON ACCOUNT TO ROLE data_security_admin_role;
GRANT USAGE ON DATABASE mydb TO ROLE data_security_admin_role;
GRANT ROLE data_security_admin_role TO USER mary;
Example: Allow user to review classification findings
If you want user joe to be able to review classification findings, but not be able to set up classification or access other Trust Center
pages, run the following commands:
USE ROLE ACCOUNTADMIN;
CREATE ROLE data_security_viewer_role;
GRANT APPLICATION ROLE SNOWFLAKE.DATA_SECURITY_VIEWER TO ROLE data_security_viewer_role;
GRANT ROLE data_security_viewer_role TO USER joe;