June 3, 2024

A Practical Guide for Handling Unauthorized Access to Snowflake

RAJEEV RAGHUNARAYAN AND CHRIS FULLER

In the last year, we have seen a sequence of breaches that have impacted major SaaS vendors, such as Microsoft and Okta. Snowflake has been in the news recently due to attacks targeted at customer-owned systems.  As these risks rise, it is crucial for organizations to act swiftly and effectively to mitigate any potential threats. This guide documents steps you can take to assess & respond to any potential breaches.

Take the steps below to eliminate an immediate risk to your Snowflake environment. Review our accompanying blog to ensure ongoing security of your Snowflake environments.

Step 1: Immediately Shut Down High Risk Activity to Snowflake

Take the following steps to shut down potential threat activity and minimize breach impact.

A) Seal Potentially Risky Access Points

B) Review Network Policies

C) Rotate Passwords and Credentials

D) Temporarily Suspend Accounts

E) Suspend Recent Data Shares

Some of these steps could be disruptive, so it’s prudent to document every change and communicate with business users as early and as often as necessary.

Step 2: Identify If You Are Compromised

A) Review Indicators of Compromise (IOCs)

B) Review Abnormal Login Activity

event:snowflake.LOGIN AND raw:”FIRST_AUTHENTICATION_FACTOR\”:\”PASSWORD” AND raw:”SECOND_AUTHENTICATION_FACTOR\”:\ null”

C) Review Recent Accounts and Activities

D) Check Privileged Role Grants

^CREATE.*|^APPLY.*|^MANAGE.*|^EXECUTE.*|ATTACH POLICY|IMPORT SHARE|OVERRIDE SHARE RESTRICTIONS|DELETE

E) Examine New Data Shares

Ongoing Security for Your Snowflake Environments

There are a few key steps you can take to ensure your Snowflake environments stay protected in the long run. It includes hardening the posture of your environments, governing the data movements and protecting the identities associated with Snowflake. Review this associated blog to learn the best steps you can take.

Next Steps

Remember that the steps above help you overcome the immediate risk. Ensure that you go beyond immediate steps to working on the long-term safety of your environment.

Obsidian has helped several organizations automate their workflows and ensure security of their Snowflake environments. To learn more about how Obsidian can help you or to get an assessment of your Snowflake deployment contact us today.

Get Started

Start in minutes and secure your critical SaaS applications with continuous monitoring and data-driven insights.

get a demo