Programmatic notifications for Trust Center findings¶
Trust Center scanners run in customer accounts to surface security violations or detect potential threats as findings. The findings appear automatically in Snowsight. A Trust Center administrator can also configure notifications so that users with verified email addresses receive notifications about findings as email messages.
This preview introduces support for additional notifications such as webhooks (PagerDuty, Slack, Microsoft Teams) and queues (Amazon SNS, Azure Event Grid, Google Pub/Sub) for Trust Center findings. The notifications are triggered by a specific event, such as generation of a finding. Using notification integrations with the Trust Center provides the option to receive notifications independent from Snowsight, through a customer-configured PagerDuty service, SNS topic, or other endpoint.
For more information, see CREATE NOTIFICATION INTEGRATION.
Configure notification integrations for Trust Center findings¶
To configure notification integrations for the Trust Center, perform the following steps:
Create a notification integration¶
To enable the Trust Center to send notifications to a third-party system, run the CREATE NOTIFICATION INTEGRATION command.
Note
Only outbound notification integrations are supported.
For more information, see CREATE NOTIFICATION INTEGRATION.
The following examples show how to create notification integrations:
AWS SNS
PagerDuty webhook
The following example creates a webhook that relies on a secret.
Note
Trust Center populates SNOWFLAKE_WEBHOOK_MESSAGE with the notification output in JSON format. Configure your notification integration to handle this appropriately.
Grant access to the integration¶
To enable the Trust Center to use an integration to send notifications, grant the USAGE privilege on the notification integration to the SNOWFLAKE application. For example:
If the integration relies on a secret, such as a PagerDuty webhook integration key, grant the following additional privileges to the SNOWFLAKE application:
READ privilege on the secret
USAGE privilege on the database containing the secret
USAGE privilege on the schema containing the secret
For example:
Configure notification settings for a scanner¶
You must define for each scanner or scanner package the findings that trigger a webhook notification. A NOTIFICATION_INTEGRATION configuration contains
this definition. To set a NOTIFICATION_INTEGRATION configuration for a scanner or a scanner package, use the SET_CONFIGURATION() stored procedure.
The configuration value is a string that contains an array of JSON objects. Each object specifies the following:
Key |
Description |
|---|---|
|
Name of the notification integration to use. |
|
Minimum severity level of a finding that triggers a notification. Valid values are |
|
Optional. When set to |
The following example sets a notification configuration for all scanners in the CIS_BENCHMARKS scanner package:
The following example sets a notification configuration for a specific scanner (CIS_BENCHMARKS_CIS1_1) within a scanner package:
You can configure multiple notification integrations for the same scanner or scanner package. The following example
configures the CIS_BENCHMARKS scanner package so that the Azure Event Grid integration receives notifications for CRITICAL
findings, the PagerDuty integration receives notifications for HIGH or CRITICAL findings, and the AWS SNS
integration receives notifications for findings of any severity level:
To remove the notification configuration for a scanner, call the UNSET_CONFIGURATION stored procedure:
Run the scanner¶
Trust Center supports schedule-based scanners and event-driven scanners. After setting the configuration, you can run a scanner on demand or wait for the scanner to either run on its schedule or be triggered by an event.
Note
An event-driven scanner does not send a notification if it detects no findings.
Notification integration notifications are sent for a scanner finding only when the severity threshold is met or exceeded.
To manually trigger a scanner, use one of the following methods:
Snowsight: Navigate to Trust Center > Manage Scanners, select the three-dot menu for the scanner, and then select Run Scanner.
For more information, see Run a scanner package on demand.
SQL: Call the
EXECUTE_SCANNERstored procedure. For example:
Interpret the notification output¶
When a Trust Center scanner runs and produces findings that meet the configured severity threshold, the notification message contains a JSON object similar to the following:
Note
The above is an example. The actual payload differs based on the notification integration configured. The at_risk_entities and metadata fields are included in the notification message only when INCLUDE_AT_RISK_ENTITIES_AND_FINDING_METADATA is enabled.
The JSON object contains the following key-value pairs:
Key |
Description |
|---|---|
|
Name of the scanner that produced the findings. |
|
Name of the scanner package containing the scanner. |
|
Short description of the scanner package. |
|
Short description of the scanner. |
|
Unix timestamp (in milliseconds) when the scanner finished running. |
|
Human-readable formatted date and time when the scanner finished running. |
|
Array of finding objects. Each finding object contains the following fields. |
Finding field |
Description |
|---|---|
|
Unique identifier for the event. |
|
Identifier for the finding. Can be used for deduplication. |
|
Severity level of the finding. |
|
Array of at-risk entity objects. Each entity contains |
|
Total number of at-risk entities. This field might be excluded. |
|
Additional metadata. The structure depends on the scanner. This field might be excluded. |
|
A note indicating whether the list of at-risk entities has been truncated. This field is present only when truncation occurs to meet the size limit constraints. If truncated, you can retrieve the full list of at-risk entities by querying the Trust Center findings. |
Troubleshoot notification issues¶
If notifications are not being delivered as expected, you can query the following to examine the notification sending flow.
To check notifications sent through the notification platform:
To check scanner notifications sent through Trust Center: