Snowflake new client application sessions

This rule is part of a beta feature. To learn more, contact Support.
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect anomalous client applications interacting in your Snowflake environment.

Strategy

This rule allows you to detect when an anomalous client application establishes a session in Snowflake. Client applications are set up to allow for automation and integrations. An attacker may have set up a session from an outside tool in order to access and exfiltrate data.

Triage and response

  1. Inspect the logs to identify the client application, operating system, and timestamp.
  2. Investigate whether that client application is expected in your environment.
  3. If there are signs of compromise, disable the client application associated with the session and rotate credentials.
PREVIEWING: esther/docs-9518-update-example-control-sensitive-log-data