Best Practices to Secure Data Access in Snowflake

Originally published by Oasis Security.In the last few days, there has been a lot of noise about an alleged Snowflake breach that impacted several companies’ supply chains. While the details remain unconfirmed, it appears that the attack is once more identity-based. It is important to remain vigilant and ensure we are doing everything in our power to maximize the security posture of mission-critical systems that store sensitive data. In this article, we want to share best practices for implem…