For more about Secure Data Sharing, please see Snowflake’s official documentation.
- Log into your Snowflake account.
- Navigate to Account > Policies.
-
Ensure Provider Sharing is set to
Enabled. If not, activate it.
us-west-2). Remember to share with Kumo’s account in the corresponding region because secure share is only allowed with accounts in the same cloud and region.
Identify Your Snowflake Account Edition
The “Secure Data Sharing” feature is available in all editions of Snowflake, including Standard, Enterprise, Business Critical, and Virtual Private Snowflake (VPS). Thus, an account using the Standard edition can share data with an account using the Enterprise edition and vice versa. An account on the BUSINESS CRITICAL edition is restricted from sharing data with an account on a lower edition. Role Permissions The role used to create the share must have the necessary permissions on the objects being shared.Creating a Snowflake Secure Share for Kumo
You can use Snowflake Secure Shares to share data with Kumo. This allows you to share the following Database objects (see https://docs.snowflake.com/en/user-guide/data-sharing-intro for more details):- Tables
- External tables
- Secure views
- Secure materialized views
CREATE SHARE command to create an empty share. For example:
GRANT <privilege> … TO SHARE command to add a database to the share and then selectively grant access to specific database objects (schemas, tables and secure views) to the share. For example:
-
Only users with the
CREATE SHAREprivilege can create a secure share. Only theACCOUNTADMINhas this privilege by default and must be granted to the role creating the secure share for Kumo. See the Snowflake documentation for more details. - Only Secure views can be shared using Snowflake Secure shares.
ALTER SHARE command to add one or more accounts access to the share. For example:
| Cloud | Region | Locator | Org Name | Account Name | Edition |
|---|---|---|---|---|---|
| AWS | US West (Oregon) | YRB86739 | LFWGWBP | ZXA66432 | Business Critical |
| AWS | US West (Oregon) | YRB86739 | LFWGWBP | KUMOUSWEST | Enterprise |
| AWS | US East (N.Virginia) | IUB99615 | LFWGWBP | KUMO_US_EAST1 | Enterprise |
| AWS | US East (Ohio) | RR45566 | LFWGWBP | KUMO_US_EAST_OHIO | Enterprise |
| AWS | US East (N.Virginia) | CZB55260 | LFWGWBP | KUMOUSEAST1BC | Business Critical |
Security Considerations
The following are key security considerations for understanding Kumo’s access mechanism to Snowflake instances.- Database Creation on Kumo’s EndKumo will generate a new database from the share received. It will serve as the central space for EDA and PoV operations.
- Defining Access RolesA unique ROLE will be crafted within Kumo’s database to guarantee secured data access.
- Allocating Exclusive AccessAccess is provided only to Kumo’s designated Point of Contact, safeguarding your data.
Monitoring Access and Activities
-
Queryable Audit Trails: Use
SHARE_USAGE,QUERY_HISTORY, andLOGIN_HISTORYviews within Snowflake to review Kumo’s interactions. - Role-Based Access Control: Monitor the unique ROLE for Kumo to ensure compliant data access.
- Data Manipulation Monitoring: Use Snowflake’s query history to document any changes made by Kumo.
- Scheduled Audits: Regularly check logs, role permissions, and shares to guarantee data safety and accuracy.