CIS Snowflake Foundations v1.0.0 L1

Audit Details

Name: CIS Snowflake Foundations v1.0.0 L1

Updated: 10/18/2024

Authority: CIS

Plugin: Snowflake

Revision: 1.0

Estimated Item Count: 30

File Details

Filename: CIS_Snowflake_Foundations_v1.0.0_L1.audit

Size: 85 kB

MD5: 43c444b505a7cc98fe16727e8d189768
SHA256: dd6aa8c029961072efcdf5b6957628e895b73447bb69cf50f99491131a225f7c

Audit Items

DescriptionCategories
1.1 Ensure single sign-on (SSO) is configured for your account / organization

ACCESS CONTROL

1.3 Ensure that Snowflake password is unset for SSO users

IDENTIFICATION AND AUTHENTICATION

1.4 Ensure multi-factor authentication (MFA) is turned on for all human users with password-based authentication

IDENTIFICATION AND AUTHENTICATION

1.5 Ensure minimum password length is set to 14 characters or more

IDENTIFICATION AND AUTHENTICATION

1.6 Ensure that service accounts use key pair authentication

IDENTIFICATION AND AUTHENTICATION

1.7 Ensure authentication key pairs are rotated every 180 days

IDENTIFICATION AND AUTHENTICATION

1.8 Ensure that users who did not log in for 90 days are disabled

ACCESS CONTROL

1.9 Ensure that the idle session timeout is set to 15 minutes or less for users with the ACCOUNTADMIN and SECURITYADMIN roles

ACCESS CONTROL

1.10 Limit the number of users with ACCOUNTADMIN and SECURITYADMIN

ACCESS CONTROL

1.11 Ensure that all users granted the ACCOUNTADMIN role have an email address assigned

ACCESS CONTROL

1.12 Ensure that no users have ACCOUNTADMIN or SECURITYADMIN as the default role

ACCESS CONTROL

1.13 Ensure that the ACCOUNTADMIN or SECURITYADMIN role is not granted to any custom role

ACCESS CONTROL

1.14 Ensure that Snowflake tasks are not owned by the ACCOUNTADMIN or SECURITYADMIN roles

ACCESS CONTROL

1.15 Ensure that Snowflake tasks do not run with the ACCOUNTADMIN or SECURITYADMIN role privileges

ACCESS CONTROL

1.16 Ensure that Snowflake stored procedures are not owned by the ACCOUNTADMIN or SECURITYADMIN roles

ACCESS CONTROL

1.17 Ensure Snowflake stored procedures do not run with ACCOUNTADMIN or SECURITYADMIN role privileges

ACCESS CONTROL

2.1 Ensure monitoring and alerting exist for ACCOUNTADMIN and SECURITYADMIN role grants

AUDIT AND ACCOUNTABILITY

2.2 Ensure monitoring and alerting exist for MANAGE GRANTS privilege grants

AUDIT AND ACCOUNTABILITY

2.3 Ensure monitoring and alerting exist for password sign-ins of SSO users

AUDIT AND ACCOUNTABILITY

2.4 Ensure monitoring and alerting exist for password sign-in without MFA

AUDIT AND ACCOUNTABILITY

2.5 Ensure monitoring and alerting exist for creation, update and deletion of security integrations

AUDIT AND ACCOUNTABILITY

2.6 Ensure monitoring and alerting exist for changes to network policies and associated objects

AUDIT AND ACCOUNTABILITY

2.7 Ensure monitoring and alerting exist for SCIM token creation

AUDIT AND ACCOUNTABILITY

2.8 Ensure monitoring and alerting exists for new share exposures

AUDIT AND ACCOUNTABILITY

3.2 Ensure that user-level network policies have been configured for service accounts

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.2 Ensure AES encryption key size used to encrypt files stored in internal stages is set to 256 bits

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.5 Ensure that the REQUIRE_STORAGE_INTEGRATION_FOR_STAGE_CREATION account parameter is set to true

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

4.6 Ensure that the REQUIRE_STORAGE_INTEGRATION_FOR_STAGE_OPERATION account parameter is set to true

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

4.7 Ensure that all external stages have storage integrations

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

4.8 Ensure that the PREVENT_UNLOAD_TO_INLINE_URL account parameter is set to true

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION, SYSTEM AND INFORMATION INTEGRITY