Under Snowflake’s Shared Responsibility Model, customers are accountable for securing how data is accessed, monitored, and protected within their environments. While Snowflake provides a secure foundation and has partnered with the Center for Internet Security (CIS) to define and promote best practices for securing Snowflake environments, each organization is responsible for implementing the necessary controls to maintain compliance, enforce least-privilege access, and reduce risk.
This blog post describes how TrustLogix helps organizations meet their responsibilities by delivering out-of-the-box monitoring policies aligned with CIS benchmarks. These policies cover key areas such as identity and access management, monitoring and alerting, network security, and data protection. In addition, TrustLogix provides extended controls to address shadow IT risks and evolving regulatory compliance requirements.
As a trusted Snowflake partner, TrustLogix strengthens customer data security with automated guardrails and real-time insights that enforce least-privilege access, detect risks, and support continuous compliance. Its DSPM capabilities help organizations discover risky access, reduce excessive privileges, and generate audit-ready evidence—so security and data teams can operate at scale. This frees data engineering teams to focus on their core projects and helps data consumers such as analysts, bots, and AI models access data faster and more securely.
The CIS Benchmarks for Snowflake offer a comprehensive set of recommendations to securely configure Snowflake environments across several critical areas:
Based on the Snowflake Shared Responsibility Model, customers are responsible for implementing security controls in each of the areas
Some of the other monitoring policies that TrustLogix provides based on the CIS Benchmark are as follows :
Category | CIS Based Policy |
Identity and Access Management | 1.8 Ensure that users who did not log in for 90 days are disabled |
1.13 Ensure that the ACCOUNTADMIN or SECURITYADMIN role is not granted to any custom role | |
Monitoring and Alerting | 2.1 Ensure monitoring and alerting exist for ACCOUNTADMIN and SECURITYADMIN role grants |
2.2 Ensure monitoring and alerting exist for MANAGE GRANTS privilege grants | |
2.4 Ensure monitoring and alerting exist for password sign-in without MFA | |
2.8 Ensure monitoring and alerting exists for new share exposures | |
2.9 Ensure monitoring and alerting exists for sessions from unsupported Snowflake Connector for Python and JDBC and ODBC drivers | |
Network Security | 3.1 Ensure that an account-level network policy has been configured to only allow access from trusted IP addresses |
Data Protection | 4.6 Ensure that the REQUIRE_STORAGE_INTEGRATION_FOR_STAGE_OPERATION account parameter is set to true |
4.7 Ensure that all external stages have storage integrations | |
4.8 Ensure that the PREVENT_UNLOAD_TO_INLINE_URL account parameter is set to true |
Beyond the CIS benchmarks, TrustLogix offers additional policies targeting Shadow IT risks and regulatory compliance. Here are a few notable examples:
Some of the other monitoring policies that TrustLogix provides are as follows :
Policy Name | Description |
Monitor_password_state_change | Monitor for any password state change |
Monitor_key_pair_auth_state_change | Monitor for any key pair authentication state change |
Monitor_auth_policy_state_change | Monitor for authentication policy state change |
Monitor_classified_data_export | Monitor for data export activity of data classified as Privacy Sensitive |
Discover_export_to_public_bucket | Data Exfiltration: Detect copy of data to a publicly accessible S3 bucket |
Detect_senstitive_schema_clone_operations | Monitor Clone of Schema classified as Privacy Sensitive by unlisted users |
Monitor_data_export_privilege_assignment | Monitor "Imported Privileges" privilege assignment to any role |
Detect_access_of_privacy_category_objects | Monitor Clone of Database classified as Privacy Sensitive by unlisted users |
Detect_deletion_of_privacy_category_table_data | Detect and notify deletion of Privacy Sensitive data |
Monitor_privileges_granted_on_classified_data_to_public_role | Regulatory Compliance: Identify Privacy Sensitive data granted to PUBLIC role |
TrustLogix's monitoring policies enhance Snowflake security by aligning with CIS benchmarks as well as by providing its own security best practices. These policies cover areas such as IAM, monitoring and alerting, network security, data protection, and additional risks such as logins from Shadow Apps / Suspicious IP’s, monitoring users with old passwords and DDL operations. By addressing these threats, organizations can strengthen defenses against emerging risks.
Through its partnership with Snowflake, TrustLogix helps enterprises securely manage data, ensure regulatory compliance, and accelerate data projects within the shared responsibility model. As a Data Security Posture Management vendor , Truslogix discovers and monitors data access and sharing activities, alerts to any unexpected data sharing, data exfiltration risks, and overly privileged roles, allowing security teams to manage business risks and avoid data breaches
Want to learn more?
Get a free data security assessment on your Snowflake accounts and secure sensitive data with TrustLogix’s out-of-the-box monitoring policies. Register for free 90-day data protection service.