Cargando…

Snowflake access control : mastering the features for data privacy and regulatory compliance /

Understand the different access control paradigms available in the Snowflake Data Cloud and learn how to implement access control in support of data privacy and compliance with regulations such as GDPR, APPI, CCPA, and SOX. The information in this book will help you and your organization adhere to p...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Larson, Jessica Megan (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Berkeley] : Apress, [2022]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_on1302106014
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 220306s2022 caua o 001 0 eng d
040 |a YDX  |b eng  |e rda  |e pn  |c YDX  |d ORMDA  |d N$T  |d GW5XE  |d YDX  |d EBLCP  |d OCLCO  |d OCLCF  |d UKAHL  |d OCLCQ  |d OCLCO 
019 |a 1302127444  |a 1302177400  |a 1302518133  |a 1302575507  |a 1302690707  |a 1302738735  |a 1302952693  |a 1302987412 
020 |a 9781484280386  |q (electronic bk.) 
020 |a 1484280385  |q (electronic bk.) 
020 |z 9781484280379 
020 |z 1484280377 
024 7 |a 10.1007/978-1-4842-8038-6  |2 doi 
029 1 |a AU@  |b 000071246053 
029 1 |a AU@  |b 000071435868 
035 |a (OCoLC)1302106014  |z (OCoLC)1302127444  |z (OCoLC)1302177400  |z (OCoLC)1302518133  |z (OCoLC)1302575507  |z (OCoLC)1302690707  |z (OCoLC)1302738735  |z (OCoLC)1302952693  |z (OCoLC)1302987412 
037 |a 9781484280386  |b O'Reilly Media 
050 4 |a QA76.9.A25  |b L37 2022 
072 7 |a COM021000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Larson, Jessica Megan,  |e author. 
245 1 0 |a Snowflake access control :  |b mastering the features for data privacy and regulatory compliance /  |c Jessica Megan Larson. 
264 1 |a [Berkeley] :  |b Apress,  |c [2022] 
264 4 |c ©2022 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
520 |a Understand the different access control paradigms available in the Snowflake Data Cloud and learn how to implement access control in support of data privacy and compliance with regulations such as GDPR, APPI, CCPA, and SOX. The information in this book will help you and your organization adhere to privacy requirements that are important to consumers and becoming codified in the law. You will learn to protect your valuable data from those who should not see it while making it accessible to the analysts whom you trust to mine the data and create business value for your organization. Snowflake is increasingly the choice for companies looking to move to a data warehousing solution, and security is an increasing concern due to recent high-profile attacks. This book shows how to use Snowflake's wide range of features that support access control, making it easier to protect data access from the data origination point all the way to the presentation and visualization layer. Reading this book helps you embrace the benefits of securing data and provide valuable support for data analysis while also protecting the rights and privacy of the consumers and customers with whom you do business. What You Will Learn Identify data that is sensitive and should be restricted Implement access control in the Snowflake Data Cloud Choose the right access control paradigm for your organization Comply with CCPA, GDPR, SOX, APPI, and similar privacy regulations Take advantage of recognized best practices for role-based access control Prevent upstream and downstream services from subverting your access control Benefit from access control features unique to the Snowflake Data Cloud Who This Book Is For Data engineers, database administrators, and engineering managers who want to improve their access control model; those whose access control model is not meeting privacy and regulatory requirements; those new to Snowflake who want to benefit from access control features that are unique to the platform; technology leaders in organizations that have just gone public and are now required to conform to SOX reporting requirements. 
505 0 |a Part I. Background -- 1. What is Access Control? -- 2. Data Types Requiring Access Control -- 3. Data Privacy Laws and Regulatory Drivers -- 4. Permission types -- Part II. Creating Roles -- 5. Functional Roles - What A Person Does -- 6. Team Roles - Who A Person Is -- 7. Assuming A Primary Role -- 8. Secondary Roles -- Part III. Granting Permissions to Roles -- 9. Role Inheritance -- 10. Account and Database Level Privileges -- 11. Schema-Level Privileges -- 12. Table and View Level Privileges -- 13. Row-Level Permissioning and Fine-Grained Access Control -- 14. Column-Level Permissioning and Data Masking -- Part IV. Operationally Managing Access Control -- 15. Secure Data Sharing -- 16. Separating Production from Development -- 17. Upstream & Downstream Services -- 18. Managing Access Requests. 
588 0 |a Print version record. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Snowflake (Electronic resource) 
650 0 |a Computer security. 
650 0 |a Data warehousing. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Entrepôts de données (Informatique) 
650 7 |a Computer security  |2 fast 
650 7 |a Data warehousing  |2 fast 
776 0 8 |i Print version:  |z 1484280377  |z 9781484280379  |w (OCoLC)1290016242 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484280386/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH39903131 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6904285 
938 |a YBP Library Services  |b YANK  |n 302753230 
938 |a EBSCOhost  |b EBSC  |n 3189090 
994 |a 92  |b IZTAP