Immuta Guides

How-to Guides

snowflake

How to Scale Cross-Organization Snowflake Data Sharing

In this blog, you’ll learn about: Snowflake data shares Considerations and complexities that can arise when “Snowflake data sharing” sensitive data How Immuta + Snowflake help simplify and scale sensitive data sharing for global organizations and can do the same for you! What is a Data Share? One of Snowflake’s major benefits...

snowflake

Implementing Snowflake Column-Level Security for PII & PHI

As sensitive data, like personally identifiable information (PII) and protected health information (PHI), becomes more widely used across industries, it is incumbent upon data teams to have mechanisms in place to protect it. Snowflake’s Column-level Security capability enables dynamic data masking of this type of sensitive data through policies that are applied at query...

alation

How to Secure Metadata with Immuta and Alation Custom Fields

amazon-web-services

How to Run SageMaker Jobs with Immuta + Amazon S3 Access Grants

snowflake

How to Manage Snowflake Fine-Grained Access Control

If Disney World were a database, we would rave about its access control strategy. It is secure: only authorized users get into the park or into any sensitive backstage areas. It is dynamic: many rides and concessions are available to the right people with the wave of a bracelet. Most...

snowflake

How to Implement Snowflake Data Masking Across Platforms

As cloud data platform adoption accelerates and organizations become more reliant on data, teams using Snowflake as the primary platform for BI must have a tool that enables data masking across Snowflake and any other platform in their data stack. This article will walk through how Immuta delivers on this need with...

snowflake

How to Implement Row-Level Security in Snowflake

Segmenting data by geographies is a common requirement for row access policies in Snowflake. Still, many data teams continue to be roadblocked when it comes to implementing complex policies for row-level security at scale – particularly for sensitive data – due to location-based data use regulations, data use agreements, and internal,...

alation

How to Implement Immuta Within Alation

Immuta is the modern data security platform that gives you the power to leverage metadata to build and automatically enforce access policies and apply dynamic data masking techniques at query time. These capabilities make Immuta a seamless fit with Alation, which many customers rely on as their enterprise-wide data catalog solution. Put simply, Immuta allows you...

databricks

How to Implement Databricks Data Masking Across Platforms

As cloud data platform adoption accelerates and organizations become more reliant on data, teams using Databricks as the primary platform for ETL and data science must have a tool that enables dynamic data masking across Databricks and any other platform in their data stack. This article will walk through how Immuta delivers on this...

azure

How to Implement Azure Data Access Control for Lakehouse Architectures

The adoption of the Data Lakehouse architecture is soaring across various industries, as the new and open paradigm combines the best elements of data lakes and data warehouses. Open file formats with transaction support, combined with low cost storage and wide adoption, enable new ways of working with data pipelines and machine...

databricks

How to Enforce Policy-As-Code for Databricks Tables

Data security is the responsibility of everyone in the organization. From ETL developers to business users and data consumers, anyone who relies on data shares a responsibility to use it appropriately. However, with several different systems and, in many cases, silos, it can often be difficult to effectively put this...

databricks

How to Enforce Databricks Row-Level Security & Cell-Level Security

Implementing row- and cell-level security by hand can be a pain, whether that means maintaining an ETL pipeline to transform raw data into “clean” data that is viewable by analysts, or maintaining a system of GRANTs on views implementing the policies for an organization. This also does not factor in...

snowflake

How To Enable Snowflake Attribute-Based Access Control

Cloud data platforms such as Snowflake provide native security and data access controls engineered for platform-specific administrators to manage roles across the organization. Snowflake leverages concepts from Discretionary Access Control (DAC) and Role-Based Access Control (RBAC) models. This provides some flexibility for and control over how users can access securable objects by managing a...

databricks

How to Anonymize Data with Databricks Access Control

Organizations with large workforces are increasingly analyzing employee data using cloud data platforms such as Databricks in order to optimize performance, engagement, and results. This trend necessitates a new approach to Databricks access control. In this article, we’ll walk data engineering and operations teams through how to dynamically enforce k-anonymization on a...

snowflake

How Immuta’s Integration with Snowflake Cortex Protects RAG Table Data

amazon-web-services

How Immuta Protects Amazon EMR Spark tables Using S3 Access Grants

amazon-web-services

Enforcing Redshift Attribute-Based Access Control

Organizations are increasingly adopting data lakehouse architectures to reap the benefits of added flexibility, scalability, and cost-efficiency that they provide. But the need to consistently implement data access control across this open architecture approach can be elusive. Here, we’ll look step-by-step at how Immuta provides centralized, fine-grained access control across different cloud data platforms...

intro-to-data-security snowflake

Enforce Compliance & Audit Reports for Data Sharing in Snowflake

Data use agreements (DUAs) are vital to ensuring individuals’ data is used compliantly and transparently. Just as data use agreements help protect data subjects’ personal privacy, avoiding misuse of personal data can protect organizations in every sector, from healthcare and financial services to the government, from liability, fines, breaches of...

Ready to get started?