This rule is part of a beta feature. To learn more, contact Support.
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect a new admin grant to a user in your Snowflake environment.

Strategy

This rule allows you to detect when a user acccount gains adminstrator privileges in Snowflake. If an attacker gains administrative access, they may grant admin-level access to a second compromised user in an attempt to fly under the radar. The following admin permissions are available: AccountAdmin, OrgAdmin, SysAdmin, and SecurityAdmin.

Triage and response

  1. Inspect the logs to identify the user, role granted, and timestamp.
  2. Investigate whether the user’s elevated permissions are expected.
  3. If there are signs of compromise, disable the user associated with the admin grant and rotate credentials.
PREVIEWING: esther/docs-9518-update-example-control-sensitive-log-data