Skip to content
Snowflake Inc.
무료로 시작하기

Questions?

Languages:
  • Deutsch
  • Français
  • Español
  • English
  • 日本語
  • 한국어
  • 플랫폼 개요
    • Workloads
    • 플랫폼 개요
    • SNOWFLAKE 데이터 마켓플레이스
    수많은 데이터 워크로드, 하나의 플랫폼
    • 데이터 웨어하우스

      최신 클라우드 데이터 웨어하우스를 지원하도록 구축된 데이터 플랫폼을 통해 분석 속도 향상

    • 데이터 레이크

      데이터를 한 곳에서 안전하고 안정적이며 사용하기 쉽게 만드십시오.

    • 데이터 엔지니어링

      간단하고 신뢰할 수 있는 데이터 파이프라인을 다양한 프로그래밍 언어로 구축

    • 데이터 사이언스

      다양한 레임워크로 모델링 하기 위한 데이터 준비 간소화

    • 데이터 애플리케이션

      비용 효율적으로 확장되고 지속해서 빠른 분석 성능을 제공하는 데이터 집약적 애플리케이션 개발 간소화

    • 데이터 공유

      비즈니스 생태계 전반에서 라이브 데이터 공유 및 협업

    데이터 클라우드: 데이터가 번성하는 곳

    Snowflake의 고객이 공유 데이터를 서로 간에 그리고 상용 데이터 공급업체 및 데이터 서비스 공급자와 안전하게 공유하고 소비하는 에코시스템에 참여하십시오.

    Learn More
    • Rise of the Data Cloud Podcast
    • Become a Member of the Data Cloud Academy
    Snowflake Data Marketplace가 특별한 이유

    번거롭게 오래된 데이터를 복사하고 이동하지 않고, 실시간으로 통제된 라이브 데이터 세트에 안전하게 액세스할 수 있습니다.

    자세히 알아보기
  • 데이터 마켓플레이스
    • 데이터 소비자
    새로운 데이터 주도 비즈니스 분석 생성

    타사 데이터에 액세스하여 조직에 대한 심층적인 분석을 제공하고 이미 협력하고 있는 SaaS 공급업체의 데이터를 Snowflake 계정으로 바로 연결할 수 있습니다.

    자세히 알아보기
  • Snowflake 파트너 네트워크
    • 파트너 개요
    • 데이터 공급자
    Snowflake Partner Network

    If you’re moving data into Snowflake or extracting insight out of Snowflake, our technology partners and system integrators will help you deploy Snowflake for your success.

    Learn More
    Data Providers

    As a Snowflake customer, easily and securely access data from potentially thousands of data providers that comprise the ecosystem of the Data Cloud. Also engage data service providers to complete your data strategy and obtain the deepest, data-driven insights possible.

    Learn More
  • 지원 및 서비스
    • 프로페셔널 서비스
    • 지원
    Snowflake 프로페셔널 서비스

    Snowflake 프로페셔널 서비스의 지원을 받아 Snowflake로 비즈니스 목표를 최적화하고 가속화하며 달성하십시오.

    연락처
    기타 서비스
    • 지원
    지원

    필요한 지원을 원할 때 받을 수 있으므로 Snowflake 데이터 클라우드를 지속적으로 활용할 수 있습니다.

    자세히 알아보기
  • Resources
    • 리소스
    • 블로그
    • Webinar
    Snowflake 리소스
    View All
    Snowflake 블로그
    View All
    • 회사에 관한 정보
    • 사고적 리더십
    • 파트너 및 고객 가치
    • 산업별 솔루션
    웨비나
    • 모든 웨비나 보기
    • 라이브 데모
    • 영업시간
    I want to...
    • Visit the Snowflake Blog
    • View Snowflake pricing
  • 회사
    • About
    Snowflake를 이끌어가는 이들

    Snowflake의 기술을 존재하게 하는 직원들에 대해 알아보십시오. 여러분과 여러분의 조직을 지원할 다양하고 열정적인 비즈니스 및 기술 전문가들이 있습니다.

    자세히 보기 연락처
무료로 시작하기
  • 플랫폼 개요
  • 데이터 마켓플레이스
  • Snowflake 파트너 네트워크
  • 지원 및 서비스
  • Resources
  • 회사

Questions?

  • Deutsch
  • Français
  • Español
  • English
  • 日本語
  • 한국어
  • Workloads
  • Platform Overview
  • Snowflake Data Marketplace
  • What is the Data Cloud
Many Data Workloads, One Platform
  • Data Warehouse
  • Data Lake
  • Data Engineering
  • Data Science
  • Data Applications
  • Data Sharing
Calculate Your Estimated Benefits of Migrating to Snowflake Get Started
A Modern Data Platform

Find out what makes Snowflake unique thanks to an architecture and technology that enables today’s data-driven organizations.

Learn More
  • Architecture
  • Security and Trust
  • Pricing
612% ROI? Read Forrester’s Total Economic Impact™ Study of Snowflake Download Now
What Makes Snowflake Data Marketplace Unique?

Securely access live and governed data sets in real time, without the risk and hassle of copying and moving stale data.

Learn More Watch Demo
  • June 27 at 10 a.m. PT: Retail and CPG
  • June 28 at 10 a.m. PT: Healthcare and Life Sciences
  • June 29 at 10 a.m. PT: Financial Services
  • June 30 at 10 a.m. PT: Advertising, Media, and Entertainment
Improve Marketing Analytics with Snowflake and iKnowlogy Learn More
Data Cloud: Where Data Thrives

Join the ecosystem where Snowflake customers securely share and consume shared data with each other, and with commercial data providers and data service providers.

Learn More
  • Rise of the Data Cloud Podcast
  • Become a Member of the Data Cloud Academy
Snowflake Summit 2022 is all about The World of Data Collaboration. Come join us! Learn More
  • Industry Solutions
  • Department Solutions
  • Financial Services
  • Advertising, Media & Entertainment
  • Healthcare & Life Sciences
  • Retail & CPG
  • Technology
  • Public Sector
  • Education
  • Manufacturing
How Snowflake Delivers to the Department

Whether its marketing analytics, a security data lake, or another line of business, learn how you can easily store, access, unite, and analyze essentially all your data with Snowflake.

  • Marketing Analytics
  • Security Data Lake
  • Product Development
  • IT
612% ROI? Read Forrester’s Total Economic Impact™ Study of Snowflake Download Now
  • For Consumers
  • For Providers
Create New Data-Driven Business Insights

Access third-party data to provide deeper insights to your organization, and get your own data from SaaS vendors you already work with, directly into your Snowflake account.

Learn More
  • June 27 at 10 a.m. PT: Retail and CPG
  • June 28 at 10 a.m. PT: Healthcare and Life Sciences
  • June 29 at 10 a.m. PT: Financial Services
  • June 30 at 10 a.m. PT: Advertising, Media, and Entertainment
The Modern Way to Share and Monetize Your Data

Generate more revenue and increase your market presence by securely and instantly publishing live, governed, and read-only data sets to thousands of Snowflake customers.

Learn More
  • June 27 at 10 a.m. PT: Retail and CPG
  • June 28 at 10 a.m. PT: Healthcare and Life Sciences
  • June 29 at 10 a.m. PT: Financial Services
  • June 30 at 10 a.m. PT: Advertising, Media, and Entertainment
  • Partner Overview
  • Technology Partners
  • Services Partners
  • Cloud Partners
  • Data Providers
  • Powered by Snowflake
Snowflake Partner Network

If you’re moving data into Snowflake or extracting insight out of Snowflake, our technology partners and system integrators will help you deploy Snowflake for your success.

Learn More
Technology Partners

Snowflake Technology Partners integrate their solutions with Snowflake, so our customers can easily get data into Snowflake and insights out of Snowflake by creating a single copy of data for their cloud data analytics strategy.

Learn More
  • Snowpark Accelerated
  • Snowflake Ready Technology Validation Program
  • Data Governance Accelerated
Service Partners

Snowflake Services Partners provide our customers with trusted and validated experts and services around implementation, migration, data architecture and data pipeline design, BI integration, ETL/ELT integration, performance, running POCs, performance optimization, and training.

Learn More
Cloud Partners

Snowflake is available on AWS, Azure, and GCP in countries across North America, Europe, Asia Pacific, and Japan. Thanks to our global approach to cloud computing, customers can get a single and seamless experience with deep integrations with our cloud partners and their respective regions.

Learn More
Data Providers

As a Snowflake customer, easily and securely access data from potentially thousands of data providers that comprise the ecosystem of the Data Cloud. Also engage data service providers to complete your data strategy and obtain the deepest, data-driven insights possible.

LEARN MORE
Powered by Snowflake

Powered by Snowflake program is designed to help software companies and application developers build, operate, and grow their applications on Snowflake. The program offers technical advice, access to support engineers who specialize in app development, and joint go-to-market opportunities.

Learn More
  • Professional Services
  • Education & Training
  • Community
  • Support
Snowflake Professional Services

Work with Snowflake Professional Services to optimize, accelerate, and achieve your business goals with Snowflake.

Learn More Contact Us
  • Education & Training
  • SnowPro Certification
  • Snowflake Community
  • Support
Calculate Your Estimated Benefits of Migrating to Snowflake Get Started
Education & Training

Find the training your team needs to be successful with Snowflake's Data Cloud.

Learn More
  • Instructor-Led Training
  • On-Demand Training
  • SnowPro Certification
Calculate Your Estimated Benefits of Migrating to Snowflake Get Started
Community

Access an ecosystem of Snowflake users where you can ask questions, share knowledge, attend a local user group, exchange ideas, and meet data professionals like you.

Learn More
  • Snowflake Community Login
  • Community Blog
  • Data Heroes
  • Discussions
  • Stack Overflow
  • User Groups
Calculate Your Estimated Benefits of Migrating to Snowflake Get Started
Support

Get the support you need, when you need it, so you can continue to leverage the Snowflake Data Cloud.

Learn More Submit a Case
  • Search for Answers
  • Documentation
  • System Status
  • Releases and Announcements
Calculate Your Estimated Benefits of Migrating to Snowflake Get Started
  • Resource Library
  • Events
  • Webinars
  • Snowflake Blog
  • Developers
  • Rise of the Data Cloud Podcast
See all
  • eBooks
  • Guides
  • Data Cloud Academy
  • Data Warehousing Glossary
  • Documentation
  • Patterns
  • Snowflake Community
Weekly Demo Register Now
Events
  • All Events
  • User Groups
  • Join us for Snowflake Summit in Las Vegas, June 13-14
Weekly Demo Register Now
Webinars
  • See All Webinars
  • Live Demo
  • Office Hours
  • Virtual Hands-On Labs
  • Snowflake on Snowflake Series
Weekly Demo Register Now
Snowflake Blog
View Blog
Weekly Demo Register Now
Snowflake for Developers

Snowflake enables you to build data-intensive applications without operational burden. Trusted by fast growing software companies, Snowflake handles all the infrastructure complexity, so you can focus on innovating your own application.

Learn More
  • BUILD: The Data Cloud Dev Summit | October 4-5
  • Developer Resources
  • Developer Guides
  • Virtual Hands-On Labs
  • Documentation
  • Stack Overflow
Weekly Demo Register Now

Hear from data leaders to learn how they leverage the cloud to manage, share, and analyze data to drive business growth, fuel innovation, and disrupt their industries.

VIEW ALL
  • Listen on Apple Podcasts
  • Listen on Spotify
  • Listen on Simplecast
Weekly Demo Register Now
  • About
  • Customers
  • Careers
  • Newsroom
The Who of Snowflake

Learn about the talent behind the technology. A diverse and driven group of business and technology experts are here for you and your organization.

Read More
  • Investor Relations
  • Leadership & Board
  • Our Values
  • Speakers Bureau
  • Snowflake Ventures
  • ESG at Snowflake
  • Sustainability at Snowflake
  • Snowflake for Good
612% ROI? Read Forrester’s Total Economic Impact™ Study of Snowflake Download Now
Customers
  • Customer Stories
  • Data Drivers Awards
  • Customer Speaker Bureau
The Data Is In: The 2020 Snowflake Customer Experience Report Download Now
Careers at Snowflake

We challenge ourselves at Snowflake to rethink what’s possible for a cloud data platform and deliver on that. We’re looking for people who share that same passion and ambition.

Current Openings
612% ROI? Read Forrester’s Total Economic Impact™ Study of Snowflake Download Now
Press and News

See Snowflake press releases, Snowflake mentions in the press, and download brand assets.

See the Latest
612% ROI? Read Forrester’s Total Economic Impact™ Study of Snowflake Download Now

Security Addendum

Last Updated: May 6, 2022 | Previous Versions

This Security Addendum1 is incorporated into and made a part of the written agreement between Snowflake and Customer that references this document (the “Agreement”) and any capitalized terms used but not defined herein shall have the meaning set forth in the Agreement. In the event of any conflict between the terms of the Agreement and this Security Addendum, this Security Addendum shall govern.   

Snowflake utilizes infrastructure-as-a-service cloud providers as further described in the Agreement and/or Documentation (each, a “Cloud Provider“) and provides the Service to Customer using a VPC/VNET and storage hosted by the applicable Cloud Provider (the “Cloud Environment“).  

Snowflake maintains a comprehensive documented security program based on NIST 800-53 (or industry recognized successor framework), under which Snowflake implements and maintains physical, administrative, and technical safeguards designed to protect the confidentiality, integrity, availability, and security of the Service and Customer Data (the “Security Program”), including, but not limited to, as set forth below. Snowflake regularly tests and evaluates its Security Program, and may review and update its Security Program as well as this Security Addendum, provided, however, that such updates shall be designed to enhance and not materially diminish the Security Program.

1. Snowflake’s Audits & Certifications

1.1. The information security management system used to provide the Service shall be assessed by independent third-party auditors as described in the following audits and certifications (“Third-Party Audits“), on at least an annual basis:

• ISO27001

• SOC 2 Type II

• SOC 1 Type II

• For Snowflake’s Business Critical Edition and Virtual Private Snowflake Edition only:

• PCI-DSS Service Provider Level 1 Certification

• FedRAMP Moderate Authorized in certain U.S. Regions (as described in the Documentation)

• HITRUST CSF Certification (where AWS or Microsoft are the Cloud Provider)

• IRAP at the Protected Level in certain Australian Regions (as described in the Documentation)

• HIPAA Compliance Report for Business Associates (where Google is the Cloud Provider)

1.2. Third-Party Audits are made available to Customer as described in Section 9.2.1.

1.3. To the extent Snowflake decides to discontinue a Third-Party Audit, Snowflake will adopt or maintain an equivalent, industry-recognized framework.

1.4. Information related to Snowflake-identified controls for which Customer is responsible in connection with FedRAMP, IRAP, and PCI-DSS is available upon written request by Customer. Customer is responsible for performing an independent assessment of its responsibilities under any of the foregoing.

2. Hosting Location of Customer Data

2.1. Hosting Location. The hosting location of Customer Data is the production Cloud Environment in the Region offered by Snowflake and selected by Customer on an Order Form or as Customer otherwise configures via the services.

 3. Encryption

3.1. Encryption of Customer Data. Snowflake encrypts Customer Data at-rest using AES 256-bit (or better) encryption. Snowflake uses Transport Layer Security (TLS) 1.2 (or better) for Customer Data in-transit over untrusted networks. 

3.2. Encryption Key Management. Snowflake’s encryption key management conforms to NIST 800-53 and involves regular rotation of encryption keys. Hardware security modules are used to safeguard top-level encryption keys. Snowflake logically separates encryption keys from Customer Data.

4. System & Network Security

4.1. Access Controls.

4.1.1. All Snowflake personnel access to the Cloud Environment is via a unique user ID, consistent with the principle of least privilege, requires a VPN, as well as multi-factor authentication and passwords meeting or exceeding PCI-DSS length and complexity requirements.

4.1.2. Snowflake personnel will not access Customer Data except (i) as reasonably necessary to provide Snowflake Offerings2 under the Agreement or (ii) to comply with the law or a binding order of a governmental body.

4.2. Endpoint Controls. For access to the Cloud Environment, Snowflake personnel use Snowflake-issued laptops which utilize security controls that include, but are not limited to, (i) disk encryption, (ii) endpoint detection and response (EDR) tools to monitor and alert for suspicious activities and Malicious Code (as defined below), and (iii) vulnerability management in accordance with Section 4.7.3 (Vulnerability Management).

4.3. Separation of Environments. Snowflake logically separates production environments from development environments. The Cloud Environment is both logically and physically separate from Snowflake’s corporate offices and networks.

4.4. Firewalls / Security Groups. Snowflake shall protect the Cloud Environment using industry standard firewall or security groups technology with deny-all default policies to prevent egress and ingress network traffic protocols other than those that are business-required.

4.5. Hardening. The Cloud Environment shall be hardened using industry-standard practices to protect it from vulnerabilities, including by changing default passwords, removing unnecessary software, disabling or removing unnecessary services, and regular patching as described in this Security Addendum.

4.6. Monitoring & Logging.

4.6.1. Infrastructure Logs. Monitoring tools or services, such as host-based intrusion detection tools, are utilized to log certain activities and changes within the Cloud Environment. These logs are further monitored, analyzed for anomalies, and are securely stored to prevent tampering for at least one year.

4.6.2. User Logs. As further described in the Documentation, Snowflake also captures logs of certain activities and changes within the Account and makes those logs available to Customer for Customer’s preservation and analysis.

4.7. Vulnerability Detection & Management.

4.7.1. Anti-Virus & Vulnerability Detection. The Cloud Environment leverages advanced threat detection tools with daily signature updates, which are used to monitor and alert for suspicious activities, potential malware, viruses and/or malicious computer code (collectively, “Malicious Code”). Snowflake does not monitor Customer Data for Malicious Code.

4.7.2. Penetration Testing & Vulnerability Detection. Snowflake regularly conducts penetration tests throughout the year and engages one or more independent third parties to conduct penetration tests of the Service at least annually. Snowflake also runs weekly vulnerability scans for the Cloud Environment using updated vulnerability databases.

4.7.3. Vulnerability Management. Vulnerabilities meeting defined risk criteria trigger alerts and are prioritized for remediation based on their potential impact to the Service. Upon becoming aware of such vulnerabilities, Snowflake will use commercially reasonable efforts to address private and public (e.g., U.S.-Cert announced) critical and high vulnerabilities within 30 days, and medium vulnerabilities within 90 days. To assess whether a vulnerability is ‘critical’, ‘high’, or ‘medium’, Snowflake leverages the National Vulnerability Database’s (NVD) Common Vulnerability Scoring System (CVSS), or where applicable, the U.S.-Cert rating.

5. Administrative Controls

5.1. Personnel Security. Snowflake requires criminal background screening on its personnel as part of its hiring process, to the extent permitted by applicable law.

5.2. Personnel Training. Snowflake maintains a documented security awareness and training program for its personnel, including, but not limited to, onboarding and on-going training.

5.3. Personnel Agreements. Snowflake personnel are required to sign confidentiality agreements. Snowflake personnel are also required to sign Snowflake’s information security policy, which includes acknowledging responsibility for reporting security incidents involving Customer Data.

5.4. Personnel Access Reviews & Separation. Snowflake reviews the access privileges of its personnel to the Cloud Environment at least quarterly, and removes access on a timely basis for all separated personnel.

5.5. Snowflake Risk Management & Threat Assessment. Snowflake’s risk management process is modeled on NIST 800­53 and ISO 27001. Snowflake’s security committee meets regularly to review reports and material changes in the threat environment, and to identify potential control deficiencies in order to make recommendations for new or improved controls and threat mitigation strategies.

5.6. External Threat Intelligence Monitoring. Snowflake reviews external threat intelligence, including US-Cert vulnerability announcements and other trusted sources of vulnerability reports. U.S.-Cert announced vulnerabilities rated as critical or high are prioritized for remediation in accordance with Section 4.7.3 (Vulnerability Management). 

5.7. Change Management. Snowflake maintains a documented change management program for the Service.

5.8. Vendor Risk Management. Snowflake maintains a vendor risk management program for vendors that process Customer Data designed to ensure each vendor maintains security measures consistent with Snowflake’s obligations in this Security Addendum.

6. Physical & Environmental Controls

6.1. Cloud Environment Data Centers. To ensure the Cloud Provider has appropriate physical and environmental controls for its data centers hosting the Cloud Environment,  Snowflake regularly reviews those controls as audited under the Cloud Provider’s third-party audits and certifications. Each Cloud Provider shall have a SOC 2 Type II annual audit and ISO 27001 certification, or industry recognized equivalent frameworks. Such controls, shall include, but are not limited to, the following:

6.1.1.   Physical access to the facilities are controlled at building ingress points;

6.1.2.   Visitors are required to present ID and are signed in;

6.1.3.   Physical access to servers is managed by access control devices;

6.1.4.   Physical access privileges are reviewed regularly;

6.1.5.   Facilities utilize monitor and alarm response procedures;

6.1.6.   Use of CCTV;

6.1.7.   Fire detection and protection systems;

6.1.8.   Power back-up and redundancy systems; and

6.1.9.   Climate control systems.

6.2. Snowflake Corporate Offices. While Customer Data is not hosted at Snowflake’s corporate offices, Snowflake’s technical, administrative, and physical controls for its corporate offices covered by its ISO 27001 certification, shall include, but are not limited to, the following:

6.2.1.  Physical access to the corporate office is controlled at office ingress points;

6.2.2.  Badge access is required for all personnel and badge privileges are reviewed regularly;

6.2.3.  Visitors are required to sign in;

6.2.4.  Use of CCTV at building ingress points;

6.2.5.  Tagging and inventory of Snowflake-issued laptops and network assets;

6.2.6.  Fire detection and sprinkler systems; and

6.2.7.  Climate control systems.

7. Incident Detection & Response

7.1. Security Incident Reporting. If Snowflake becomes aware of a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Customer Data (a “Security Incident“), Snowflake shall notify Customer without undue delay, and in any case, where feasible, notify Customer within 72 hours after becoming aware3. To facilitate timely notification, Customer must register and maintain an up-to-date email within the Service for this type of notification. Where no such email is registered, Customer acknowledges that the means of notification shall be at Snowflake’s reasonable discretion and Snowflake’s ability to timely notify shall be negatively impacted.

7.2. Investigation. In the event of a Security Incident as described above, Snowflake shall promptly take reasonable steps to contain, investigate, and mitigate any Security Incident. Any logs determined to be relevant to a Security Incident, shall be preserved for at least one year. 

7.3. Communication and Cooperation. Snowflake shall provide Customer timely information about the Security Incident to the extent known to Snowflake, including, but not limited to, the nature and consequences of the Security Incident, the measures taken and/or proposed by Snowflake to mitigate or contain the Security Incident, the status of Snowflake’s investigation, a contact point from which additional information may be obtained, and the categories and approximate number of data records concerned. Notwithstanding the foregoing, Customer acknowledges that because Snowflake personnel may not have visibility to the content of Customer Data, it may be unlikely that Snowflake can provide information as to the particular nature of the Customer Data, or where applicable, the identities, number, or categories of affected data subjects. Communications by or on behalf of Snowflake with Customer in connection with a Security Incident shall not be construed as an acknowledgment by Snowflake of any fault or liability with respect to the Security Incident.

8. Deletion of Customer Data.

8.1. By Customer. The Service provides Customer controls for the deletion of Customer Data, as further described in the Documentation.

8.2. By Snowflake. Subject to applicable provisions of the Agreement, upon the later of (i) expiration or termination of the Agreement and (ii) expiration of any post-termination “retrieval period” set forth in the Agreement, Snowflake shall promptly delete any remaining Customer Data. 

9. Customer Rights & Shared Security Responsibilities

9.1. Customer Penetration Testing. Customer may provide a written request for a penetration test of its Account (“Pen Test“) by submitting such request via a support ticket. Following receipt by Snowflake of such request, Snowflake and Customer shall mutually agree in advance on details of such Pen Test, including the start date, scope and duration, as well as reasonable conditions designed to mitigate potential risks to confidentiality, security, or other potential disruption of the Service or Snowflake’s business. Pen Tests and any information arising therefrom are deemed Snowflake’s Confidential Information. If Customer discovers any actual or potential vulnerability in connection with a Pen Test, Customer must immediately disclose it to Snowflake and shall not disclose it to any third-party.

9.2. Customer Audit Rights.

9.2.1.   Upon written request and at no additional cost to Customer, Snowflake shall provide Customer, and/ or its appropriately qualified third-party representative (collectively, the “Auditor“), access to reasonably requested documentation evidencing Snowflake’s compliance with its obligations under this Security Addendum in the form of, as applicable, (i) Snowflake’s ISO 27001, HITRUST CSF,  and PCI-DSS third-party certifications, (ii) Snowflake’s SOC 2 Type II audit report, SOC 1 Type II audit report, and HIPAA Compliance Report for Business Associates, (iii) Snowflake’s most recently completed industry standard security questionnaire, such as a SIG or CAIQ, and (iv) data flow diagrams for the Service (collectively with Third-Party Audits, “Audit Reports”).

9.2.2.   Customer may also send a written request for an audit of Snowflake’s applicable controls, including inspection of its facilities. Following receipt by Snowflake of such request, Snowflake and Customer shall mutually agree in advance on the details of the audit, including the reasonable start date, scope and duration of and security and confidentiality controls applicable to any such audit. Snowflake may charge a fee (rates shall be  reasonable, taking into account the resources expended by Snowflake) for any such audit. Audit Reports, any audit, and any information arising therefrom shall be considered Snowflake’s Confidential Information.

9.2.3.   Where the Auditor is a third-party (or Customer is using a third-party to conduct an approved Pen Test under Section 9.1), such third party may be required to execute a separate confidentiality agreement with Snowflake prior to any audit, Pen Test, or review of Audit Reports, and Snowflake may object in writing to such third party if in Snowflake’s reasonable opinion the third party is not suitably qualified or is a direct competitor of Snowflake. Any such objection by Snowflake will require Customer to appoint another third party or conduct such audit, Pen Test, or review itself. Any expenses incurred by an Auditor in connection with any review of Audit Reports, or an audit or Pen Test, shall be borne exclusively by the Auditor.     

9.3. Sensitive Customer Data. Use of the Service to meet requirements of PCI-DSS, HIPAA, FedRAMP, or similar heightened standards, require additional controls which shall be implemented by Customer, including that Customer Data subject to such requirements may only be uploaded to Editions and Regions of the Service specifically designated in the Documentation for such requirements. Additionally, Customer must implement all appropriate Customer-configurable security controls, including IP whitelisting and MFA for all User interactive logins (e.g., individuals authenticating to the Service) to protect such data.

9.4. Shared Security Responsibilities. Without diminishing Snowflake’s commitments in this Security Addendum, Customer agrees:

9.4.1. Snowflake has no obligation to assess the content, accuracy or legality of Customer Data, including to identify information subject to any specific legal, regulatory or other requirement and Customer is responsible for making appropriate use of the Service (including not uploading data that requires a certification and/or authorization which is not identified in Section 1.1) to ensure a level of security appropriate to the particular content of Customer Data, including, where appropriate, implementation of encryption functionality, such as the “tri-secret secure” feature (as described in the Documentation), pseudonymization of Customer Data, and configuration of the Service to back-up Customer Data;

9.4.2. Customer is responsible for managing and protecting its User roles and credentials, including but not limited to (i) ensuring that all Users keep credentials confidential and not share such information with unauthorized parties, (ii) promptly reporting to Snowflake any suspicious activities related to Customer’s Account (e.g., a user credential has been compromised), (iii) appropriately configuring User and role-based access controls, including scope and duration of User access, taking into account the nature of its Customer Data, and (iv) maintaining appropriate password uniqueness, length, complexity, and expiration;

9.4.3. To appropriately manage and protect any Customer-managed encryption keys to ensure the integrity, availability, and confidentiality of the key and Customer Data encrypted with such key; and

9.4.4. To promptly update its Client Software whenever Snowflake announces an update.

Previous Versions

2021

September 7, 2021 – Security Addendum

2020

November 9, 2020 – Security Addendum

1. For clarity, where Customer’s Agreement refers to the defined term “Security Policy”, such reference shall be interpreted to refer to this exhibit.

2. If Snowflake Offering(s) is not defined in the Agreement, “Snowflake Offering(s)” means the Service, Technical Services (including any Deliverables), and any support and other ancillary services (including, without limitation, services to prevent or address service or technical problems) provided by Snowflake.

3. For clarity, where Customer’s Agreement refers to the defined term “Security Breach“, such reference shall be interpreted to refer to Security Incident, as defined herein.

Snowflake Inc.
  • 플랫폼 개요
    • 아키텍처
    • 데이터 애플리케이션
  • 데이터 마켓플레이스
  • Snowflake 파트너 네트워크
  • 지원 및 서비스
  • 회사
    • 문의하기

Sign up for Snowflake Communications

Thanks for signing up!

  • Privacy Notice
  • Site Terms
  • Cookie Settings

© 2022 Snowflake Inc. All Rights Reserved