Snowflake external access occurred

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Detect when an external access event occurs in your Snowflake environment.

Strategy

This rule allows you to detect when a new external access event occurs in Snowflake. Review any suspicious entries of external access performed by procedure or user-defined function (UDF) handler code within the last 365 days through the External Access History table. Unexpected use of external access for your environment is a potential indicator of compromise.

Triage and response

  1. Inspect the logs to identify the source cloud, source region, target cloud, target region, and query ID.
  2. Investigate whether the source and target cloud locations are expected.
  3. Using the query ID, correlate the behavior with Query History logs to determine the user, query, and other useful information.
  4. If there are signs of compromise, disable the user associated with the external access integration and rotate credentials.
PREVIEWING: Cyril-Bouchiat/add-vm-package-explorer-doc