Page 137 - Cyber Defense eMagazine August 2024
P. 137

service, ideal for digital transformation initiatives. That ease of use has resulted in the aggregation of vast
            amounts of sensitive data from multiple sources. Inevitably, these data stores attract cyber adversaries
            because that data is ideal for identity theft, ransomware, social engineering, and other malicious activities.

            Beyond the data held in Snowflake  databases,  it also offers extensive data integration capabilities  that
            make it easy to move data into and out of the cloud data platform. Snowflake also offers dozens of data
            integration  tools and technologies  (Amazon  Data Firehose,  Google Cloud,  Informatica,  Apache  Kafka,
            and  SAP  to  name  just  a few).  Its  ecosystem  of technology  partners  delivers  connectors  that  make  it
            simple to integrate with popular applications, databases, and cloud platforms. This ecosystem is easy to
            use, but also increases the potential attack surface for malicious actors. Snowflake is also part of a larger
            IT  stack.  As  such,  it  may  not  always  get  security  team  attention.  In  addition,  attackers  may  target
            vulnerabilities in other parts of the IT stack to gain access to the troves of data Snowflake holds.




            Modern Enterprises Are Data Dumping Grounds

            As data continues to grow, organizations seek to find ways to use it, and Snowflake is integral to this use.
            Data pipelines automate many of the steps organizations had to take manually to transform and optimize
            those continuous data loads. The pipelines make it easy to move, analyze, use, and store data for future
            use;  all  of  this  is  vital  for  business  growth.  However,  data  pipelines  become,  in  effect,  business-
            sanctioned Trojan horses. Lines of business use those pipelines to move customer data to warehouses
            for analysis without understanding how they may have created new attack paths for adversaries.

            Data warehouses  are also  collaborative;  businesses  grant wide  access  to their employees  to  analyze
            and use that  data, further increasing  the data attack surface  because  it’s so easy to move,  copy, and
            share.  Unfortunately,  most  employees  often  do  not  have  the  same  security  awareness  training  or
            accountability  as  a  database  administrator.  Nevertheless,  their  accounts  have  access  to  massive
            amounts of sensitive data. What organizations must understand is that, fundamentally, data itself has no
            rules  unless  your  organization  puts  protections  in place  to  secure  that  data  as  it  grows,  moves,  and
            changes.



            Reduce the Data Risk Surface

            Attackers  have  already  shown  that  they  can  access  sensitive  data  using  Snowflake  accounts;  in
            response,  organizations  must  now  act to reduce  the  data  risk surface.  They  can do  this in a  few key
            ways: by minimizing data access, eliminating stale data, and hardening the data they have.

               •  Minimizing data access is critical when organizations have opened up data warehouses to allow
                   multiple lines of business easy access to data. Security teams need to assess identity access to
                   ensure that they are only granting  users the minimum  level of access required  to perform  their
                   jobs, adopting the principle of least privilege. If a user’s account is compromised, the attacker will
                   only have access to a small subset of the data.








            Cyber Defense eMagazine – August 2024 Edition                                                                                                                                                                                                          137
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   132   133   134   135   136   137   138   139   140   141   142