SaaS Security
Onboard a Snowflake App to SSPM
Table of Contents
Expand All
|
Collapse All
SaaS Security Docs
-
-
- Begin Scanning an Amazon S3 App
- Begin Scanning a Bitbucket App
- Begin Scanning a Box App
- Begin Scanning ChatGPT Enterprise App
- Begin Scanning a Cisco Webex Teams App
- Begin Scanning a Confluence App
- Begin Scanning a Confluence Data Center App
- Begin Scanning a Dropbox App
- Begin Scanning a GitHub App
- Begin Scanning a Gmail App
- Begin Scanning a Google Cloud Storage App
- Begin Scanning a Google Drive App
- Begin Scanning a Jira App
- Begin Scanning a Jira Data Center App
- Begin Scanning a Microsoft Azure Storage App
- Begin Scanning a Microsoft Exchange App
- Begin Scanning a Microsoft Teams App
- Begin Scanning Office 365 Apps
- Begin Scanning a Salesforce App
- Begin Scanning a ServiceNow App
- Begin Scanning a ShareFile App
- Begin Scanning a Slack Enterprise App
- Begin Scanning a Slack for Pro and Business App
- Begin Scanning a Workday App
- Begin Scanning a Zendesk App
- Begin Scanning a Zoom App
- Perform Actions on Sanctioned Apps
- API Throttling
- Configure Classification Labels
- Microsoft Labeling for Office 365
- Google Drive Labeling
- Configure Phishing Analysis
- Configure WildFire Analysis
- Fine-Tune Policy
-
- What is an Incident?
- Filter Incidents
- Configure Slack Notification Alerts on Data Security
- Security Controls Incident Details
- Track Down Threats with WildFire Report
- Customize the Incident Categories
- Close Incidents
- Download Assets for Incidents
- View Asset Snippets for Incidents
- Modify Incident Status
- Email Asset Owners
- Generate Reports on Data Security
- Integrate CIE with Data Security
- Search in Data Security
-
-
- View Usage Data for Unsanctioned SaaS Apps
- SaaS Visibility Application Attributes
- How SaaS Security Inline Determines an App's Risk Score
- Identify Risky Unsanctioned SaaS Apps and Users
- Generate the SaaS Security Report
- Filter Unsanctioned SaaS Apps
-
- SaaS Policy Rule Recommendations
- App-ID Cloud Engine
- Guidelines for SaaS Policy Rule Recommendations
- Apply Predefined SaaS Policy Rule Recommendations
- Create SaaS Policy Rule Recommendations
- Enable SaaS Policy Rule Recommendations
- Monitor SaaS Policy Rule Recommendations
- Delete SaaS Policy Rule Recommendations
- Modify Active SaaS Policy Rule Recommendations
- Manage Enforcement of Rule Recommendations on Strata Cloud Manager
- Manage Enforcement of Rule Recommendations on Panorama
- Tag Discovered SaaS Apps
- Apply Tag Recommendations to Sanctioned Apps
- Change Risk Score for Discovered SaaS Apps
- Troubleshoot Issues on SaaS Security Inline
-
-
- Onboarding Overview for Supported SaaS Apps
- Onboard an Aha.io App to SSPM
- Onboard an Alteryx Designer Cloud App to SSPM
- Onboard an Aptible App to SSPM
- Onboard an ArcGIS App to SSPM
- Onboard an Articulate Global App to SSPM
- Onboard an Atlassian App to SSPM
- Onboard a BambooHR App to SSPM
- Onboard a Basecamp App to SSPM
- Onboard a Bitbucket App to SSPM
- Onboard a Bito AI App to SSPM
- Onboard a BlueJeans App to SSPM
- Onboard a Box App to SSPM
- Onboard a Bright Security App to SSPM
- Onboard a Celonis App to SSPM
- Onboard a Cisco Meraki App to SSPM
- Onboard a Claude App to SSPM
- Onboard a ClickUp App to SSPM
- Onboard a Codeium App to SSPM
- Onboard a Cody App to SSPM
- Onboard a Confluence App to SSPM
- Onboard a Contentful App to SSPM
- Onboard a Convo App to SSPM
- Onboard a Couchbase App to SSPM
- Onboard a Coveo App to SSPM
- Onboard a Crowdin Enterprise App to SSPM
- Onboard a Customer.io App to SSPM
- Onboard a Databricks App to SSPM
- Onboard a Datadog App to SSPM
- Onboard a DocHub App to SSPM
- Onboard a DocuSign App to SSPM
- Onboard a Dropbox Business App to SSPM
- Onboard an Envoy App to SSPM
- Onboard an Expiration Reminder App to SSPM
- Onboard a Gainsight PX App to SSPM
- Onboard a GitHub Enterprise App to SSPM
- Onboard a GitLab App to SSPM
- Onboard a Google Analytics App to SSPM
- Onboard a Google Workspace App to SSPM
- Onboard a GoTo Meeting App to SSPM
- Onboard a Grammarly App to SSPM
- Onboard a Harness App to SSPM
- Onboard a Hellonext App to SSPM
- Onboard a Hugging Face App to SSPM
- Onboard an IDrive App to SSPM
- Onboard an Intercom App to SSPM
- Onboard a Jira App to SSPM
- Onboard a Kanbanize App to SSPM
- Onboard a Kanban Tool App to SSPM
- Onboard a Krisp App to SSPM
- Onboard a Kustomer App to SSPM
- Onboard a Lokalise App to SSPM
- Onboard a Microsoft 365 Copilot App to SSPM
- Onboard a Microsoft Azure AD App to SSPM
- Onboard a Microsoft Exchange App to SSPM
- Onboard a Microsoft OneDrive App to SSPM
- Onboard a Microsoft Outlook App to SSPM
- Onboard a Microsoft Power BI App to SSPM
- Onboard a Microsoft SharePoint App to SSPM
- Onboard a Microsoft Teams App to SSPM
- Onboard a Miro App to SSPM
- Onboard a monday.com App to SSPM
- Onboard a MongoDB Atlas App to SSPM
- Onboard a MuleSoft App to SSPM
- Onboard a Mural App to SSPM
- Onboard a Notta App to SSPM
- Onboard an Office 365 App to SSPM
- Onboard Office 365 Productivity Apps to SSPM
- Onboard an Okta App to SSPM
- Onboard an OpenAI App to SSPM
- Onboard a PagerDuty App to SSPM
- Onboard a Perplexity App to SSPM
- Onboard a Qodo App to SSPM
- Onboard a RingCentral App to SSPM
- Onboard a Salesforce App to SSPM
- Onboard an SAP Ariba App to SSPM
- Onboard a ServiceNow App to SSPM
- Onboard a Slack Enterprise App to SSPM
- Onboard a Snowflake App to SSPM
- Onboard a SparkPost App to SSPM
- Onboard a Tableau Cloud App to SSPM
- Onboard a Tabnine App to SSPM
- Onboard a Webex App to SSPM
- Onboard a Weights & Biases App to SSPM
- Onboard a Workday App to SSPM
- Onboard a Wrike App to SSPM
- Onboard a YouTrack App to SSPM
- Onboard a Zendesk App to SSPM
- Onboard a Zoom App to SSPM
- Onboarding an App Using Azure AD Credentials
- Onboarding an App Using Okta Credentials
- Register an Azure AD Client Application
- View the Health Status of Application Scans
- Delete SaaS Apps Managed by SSPM
-
-
-
- New Features Introduced in December 2024
- New Features Introduced in November 2024
- New Features Introduced in October 2024
- New Features Introduced in August 2024
- New Features Introduced in July 2024
- New Features Introduced in June 2024
- New Features Introduced in May 2024
- New Features Introduced in April 2024
- New Features Introduced in March 2024
- New Features Introduced in January 2024
-
- New Features Introduced in November 2023
- New Features Introduced in October 2023
- New Features Introduced in September 2023
- New Features Introduced in August 2023
- New Features Introduced in July 2023
- New Features Introduced in June 2023
- New Features Introduced in May 2023
- New Features Introduced in April 2023
- New Features Introduced in March 2023
- New Features Introduced in January 2023
-
- New Features Introduced in December 2021
- New Features Introduced in October 2021
- New Features Introduced in September 2021
- New Features Introduced in August 2021
- New Features Introduced in July 2021
- New Features Introduced in June 2021
- New Features Introduced in May 2021
- New Features Introduced in March 2021
- New Features Introduced in January 2021
Onboard a Snowflake App to SSPM
Connect a Snowflake App instance to SSPM to detect posture risks.
Where Can I Use This? | What Do I Need? |
---|---|
|
Or any of the following licenses that include the Data Security license:
|
For SSPM to detect posture risks in your Snowflake instance, you must onboard your
Snowflake instance to SSPM. Through the onboarding process, SSPM connects to a
Snowflake API and, through the API, scans your Snowflake instance for misconfigured
settings. If there are misconfigured settings, SSPM suggests a remediation action
based on best practices.
SSPM gets access to your Snowflake instance through OAuth 2.0 authorization. To
enable OAuth 2.0 authorization, you first create an OAuth 2.0 security integration
in Snowflake. When creating this security integration, you will also create a custom
role that has the permissions that SSPM requires to run scans, and you will assign a
new user to this custom role.
During onboarding, you will provide SSPM with the following information.
Item | Description |
---|---|
Account URL |
A URL for accessing your Snowflake account. This is the
account that you will use to create your OAuth 2.0 security
integration.
Required Permissions: The account that you will use
to create your OAuth 2.0 security integration must be
assigned to the ACCOUNTADMIN role.
|
Client ID |
SSPM will access a Snowflake API through an OAuth 2.0
security integration that you create. Snowflake generates
the Client ID to uniquely identify this security
integration.
|
Client Secret |
SSPM will access a Snowflake API through an OAuth 2.0
integration app that you create. Snowflake generates the
Client Secret, which SSPM uses to authenticate to this
security integration.
|
After you supply this information to SSPM, SSPM will redirect you to log in to
Snowflake. You will log in to Snowflake as the new user that you assigned to the
custom role. Snowflake will then prompt you to grant SSPM the access it needs to
your Snowflake instance.
As you complete the following steps, make note of the values of the items described
in the preceding table. You will need to enter these values during onboarding to
access your Snowflake instance from SSPM. You will also need to make note of the
user credientials for the new user that you assigned to the custom role.
- Create an OAuth 2.0 security integration.
- From SSPM, get the redirect URL that you will need when you create your OAuth 2.0 security integration in Snowflake. To get this information, you will begin the onboarding process in SSPM, but you will not complete the process.
- From the Add Application page in SSPM ( Posture SecurityApplicationsAdd Application), click the Snowflake tile.
- On the Posture Security tab, Add New instance.
- Log in with Credentials.SSPM displays a page for onboarding a Snowflake instance. The Redirect URL field displays the redirect URL value.
- Copy the URL and paste it into a text file.Don't continue to the next step unless you have copied the redirect URL. You will need to specify this URL later when you're configuring your OAuth 2.0 security integration in Snowflake.
- Because you won't be completing the onboarding process until after you have gathered the necessary configuration information, Cancel the onboarding process and return to the Apps Onboarding page.
- Identify the Snowflake administrator account that you will use to create your OAuth 2.0 security integration. Verify that the administrator is assigned to the ACCOUNTADMIN role.To verify that the account is assigned to the necessary roles, complete the following steps:
- From the left navigation pane in Snowflake, select AdminUsers & Roles.
- Select the name of the user whose roles you want to verify.
- On the information page for the user, locate the Granted Roles section. Verify that the user is assigned to the ACCOUNTADMIN role. If the user isn’t assigned to this role, you can Grant Role.
- Identify the account URL for the Snowflake administrator account.
- Open a web browser to the Snowflake login page, and log in to the administrator account you identified earlier.
- From the Snowflake home page, select AdminAccounts.On the Accounts page, hover over the LOCATOR column and click the link icon to copy the Account URL.
- Paste the account URL into a text file.Don’t continue to the next step unless you have copied the account URL. You will provide this information to SSPM during the onboarding process.
- Create an OAuth 2.0 security integration.When you later onboard Snowflake to SSPM, you will supply SSPM with the application credentials (Client ID and Client Secret) of your OAuth 2.0 security integration. SSPM will redirect you to log in to Snowflake to allow the requested permissions.In this step, you will create an SQL worksheet to run a series of SQL statements that will create the OAuth 2.0 security integration and also the user account that you will use to log in to Snowflake to allow the requested permissions. The new user will be assigned to a new custom role that will limit the user's permissions to only the permissions that SSPM requires.
- Open a web browser to the Snowflake login page, and log in to the administrator account you identified earlier.
- From the Snowflake home page, select ProjectsWorksheets.
- On the Worksheets page, select + SQL Worksheet to create an SQL worksheet.
- In the new worksheet that you created, select the ACCOUNTADMIN role and a warehouse that the ACCOUNTADMIN role has privileges to use.
- Paste the following SQL statements into your worksheet, and
replace the following variables in the worksheet with
information specific to the OAuth 2.0 security integration that
you're creating.
- The SQL statements first create a warehouse and a custom role for the user who will grant SSPM permissions during onboarding. In the SQL statements that we provided, replace all occurrences of <warehouse_name> and <custom_role_name> with names for the new warehouse and custom role.
- The SQL statements then create the user account that you
will use during onboarding to log in to Snowflake to
grant SSPM the permissions that it needs. Replace all
occurrences of <username> with the
name you want to give to this user. Also replace
<password> and
<email> with a user name and
password for the new user. Make note of the user name
and password.Don’t continue to the next step unless you have noted the user name and password. You will need this information to log in to Snowflake during the onboarding process.
- The SQL statements then grant the required permissions to the custom role and assign the user to the custom role. Double check that you have replaced all the variables in these sections.
- Finally, the SQL statements create the OAuth 2.0 security integration. Replace <integration_name> with a name for your OAuth 2.0 security integration. Replace <redirect_url_from_onboarding_page> with the redirect URL that you obtained from SSPM.
// Create minimum size warehouse and custom role CREATE OR REPLACE WAREHOUSE <warehouse_name> WITH WAREHOUSE_SIZE = XSMALL AUTO_SUSPEND = 30 AUTO_RESUME = TRUE INITIALLY_SUSPENDED = TRUE; CREATE OR REPLACE ROLE <custom_role_name>; // Create a new user CREATE OR REPLACE USER <username> PASSWORD='<password>' EMAIL='<email>' DEFAULT_ROLE=<custom_role_name> DEFAULT_WAREHOUSE=<warehouse_name>; // Give required permissions to the role GRANT OPERATE ON WAREHOUSE <warehouse_name> TO ROLE <custom_role_name>; -- To resume warehouse GRANT USAGE ON WAREHOUSE <warehouse_name> TO ROLE <custom_role_name>; -- To run SQL queries GRANT MONITOR ON ACCOUNT TO ROLE <custom_role_name>; -- Grants permission to approve OAuth integration GRANT APPLY PASSWORD POLICY ON ACCOUNT TO ROLE <custom_role_name>; -- To view password policy description GRANT APPLY AUTHENTICATION POLICY ON ACCOUNT TO ROLE <custom_role_name>; -- To view authentication policy description GRANT APPLY SESSION POLICY ON ACCOUNT TO ROLE <custom_role_name>; -- To view session policy description // Assign the new user to the role GRANT ROLE <custom_role_name> TO USER <username>; // Create an OAuth security integration CREATE OR REPLACE SECURITY INTEGRATION <integration_name> TYPE = OAUTH OAUTH_CLIENT = CUSTOM OAUTH_CLIENT_TYPE = 'CONFIDENTIAL' OAUTH_REDIRECT_URI = '<redirect_url_from_onboarding_page>' OAUTH_ISSUE_REFRESH_TOKENS = TRUE OAUTH_REFRESH_TOKEN_VALIDITY = 7776000 ENABLED = TRUE; // Get Client ID and Client Secret SELECT SYSTEM$SHOW_OAUTH_CLIENT_SECRETS('<integration_name>');
- Click the run button in the upper-right corner of the worksheet page to execute the SQL statements.Snowflake will create the security integration, custom role, and user account. Snowflake displays the application credentials (Client ID and Client Secret) for the security integration in the Results area of the worksheet page.
- Copy the Client ID (OAUTH_CLIENT_ID) and Client Secret (OAUTH_CLIENT_SECRET) and paste them into a text file.Don't continue to the next step unless you have copied the Client ID and Client Secret. You must provide this information to SSPM during the onboarding process.
- Connect SSPM to your Snowflake instance.In SSPM, complete the following steps to enable SSPM to connect to your Snowflake instance.
- From the Add Application page in SSPM (Posture SecurityApplicationsAdd Application ), click the Snowflake tile.
- On the Posture Security tab, Add New instance.
- Log in with Credentials.
- Enter the application credentials (Client ID and Client Secret) and the Account Locator and Connect.SSPM redirects you to the Snowflake login page.
- Log in to the new user account that you assigned to the new custom role.Snowflake displays a consent form that details the access permissions that SSPM requires.
- Review the consent form and allow the requested permissions.