turbot/snowflake_compliance
Loading controls...

Benchmark: Data Encryption

Overview

All data stored in Snowflake is transparently encrypted using a key hierarchy (with cloud HSM backed root of trust), which provides enhanced security by encrypting individual pieces of data using a different key. Snowflake also offers the use of a customer-managed key (CMK) in this encryption process through a feature called Tri-Secret Secure. Independent of the Tri-secret secure feature, Snowflake rotates the keys every 30 days, ensuring that new data ingested after 30 days is encrypted using a new key hierarchy.

Usage

Install the mod:

mkdir dashboards
cd dashboards
powerpipe mod init
powerpipe mod install github.com/turbot/steampipe-mod-snowflake-compliance

Start the Powerpipe server:

steampipe service start
powerpipe server

Open http://localhost:9033 in your browser and select Data Encryption.

Run this benchmark in your terminal:

powerpipe benchmark run snowflake_compliance.benchmark.security_overview_data_encryption

Snapshot and share results via Turbot Pipes:

powerpipe benchmark run snowflake_compliance.benchmark.security_overview_data_encryption --share

Controls

Tags