Secure Snowflake data, roles, and integrations with Obsidian Security

Snowflake MFA bypass & token misuse leads to major breaches

Attackers used stolen customer credentials without MFA to breach hundreds of businesses. 

Obsidian makes it easy for organizations to automate workflows and ensure security of their Snowflake environments are in line with best practices.

165

companies breached via unsecured Snowflake accounts

BleepingComputer

$2.7M

successfully extorted from hacked businesses

CyberScoop

81%

of organizations have sensitive SaaS data exposed

Obsidian Network Data

Privileged users, OAuth apps & external tools create blind spots in Snowflake

Without guidance, security teams can’t keep pace with fast-changing permissions and integrations within Snowflake.

  • User accounts that bypass MFA lack security oversight and increase risk of unauthorized access 
  • Hidden long-term third-party access through external integrations (e.g. ETL tools, BI platforms) using OAuth or persistent tokens 
  • Inactive privileged users with ACCOUNTADMIN, SECURITYADMIN, or custom roles with broad privileges go unnoticed
Obsidian interface displaying Snowflake login audit logs with detailed JSON event data, identifying password-based access and JDBC client usage.
Obsidian dashboard visualizing Snowflake data access trends over time alongside flagged schema configurations missing data masking or row-level access controls.

Automate Snowflake posture management with Obsidian Security

  • Identify privileged accounts without MFA and local accounts bypassing your IdP
  • Revoke dormant accounts and unnecessary access permissions
  • Discover and monitor Snowflake integrations with high-volume queries or unusual access patterns to sensitive data
  • Enforce data masking policies to limit access to sensitive data

Related Resources