Immuta Guides

All Guides

all-data-platforms

Zero Trust at Scale: Securing Federal Data

For federal agencies, protecting sensitive data isn’t just a matter of compliance – it could impact national security. A 2021 executive order aimed to bolster data security for public sector organizations by mandating zero trust architectures, which require continuous verification and authentication of user identities before allowing access to data. To support these organizations, Accenture Federal Services built its...

starburst

Starburst Data Security & Access Control with Immuta

See how to build and enforce simple yet robust Starburst data security and access control using Immuta. This demo shows how to create purpose-based controls on sensitive financial data, so you can ensure the right users can access data for the right reasons.

snowflake-demo-library

Simplifying Snowflake Data Security and Native Controls

Immuta partners with Snowflake to ensure customers can protect and govern their data on the Snowflake Data Cloud. With Immuta, customers can create data policies once and have them enforced across multiple data and cloud platforms without manual role management.

amazon-web-services-demo-library

Securing Amazon SageMaker Access to Data in S3 using Immuta

Struggling to manage your Amazon S3 controls? Learn how Immuta enables teams to create and manage subscription policies on their S3 objects so that all downstream users can get more use and value out of that data. Learn more about Immuta + Amazon S3 here.

all-data-platforms

Scaling Secure Data Use with Immuta Domains

In this demo, you’ll learn how to create an Immuta Domain, assign users and permissions, and manage policies to control data access within these decentralized domains. Learn more about Domains in this blog.

all-data-platforms

Randomized Response for Genomics Data

See how you can use randomization as a manner of protecting the privacy of sensitive genomics data. Learn more about securing genomics data here.

snowflake-demo-library

Protecting Sensitive Healthcare Data in Snowflake

Learn how Immuta can protect sensitive healthcare and life sciences data sets in The Snowflake Data Cloud.

databricks-demo-library

Protecting Sensitive Healthcare Data in Databricks

See how Immuta simplifies, scales, and audits access controls in Databricks for sensitive healthcare and life sciences data sets.

alation-demo-library

Importing Alation Custom Fields into Immuta

Learn how to import Custom Fields from Alation into the Immuta Data Security Platform in order to support dynamic access controls. Find more on Immuta + Alation here.

snowflake-demo-library

Immuta + Snowflake Overview

See how Immuta’s native integration with Snowflake allows you to easily discover sensitive data, secure it with dynamic attribute-based access control and advanced data masking, and monitor usage to detect risks or threats.

snowflake-demo-library

Immuta & Snowflake for Data Mesh Federated Governance

In this demo, Immuta CTO Steve Touw explains how to achieve both horizontal and vertical policy enforcement in data mesh architectures using Immuta and Snowflake. Through a real-life scenario, you’ll see how Immuta simplifies data discovery, access control, and auditing on data products and workloads in Snowflake, allowing domain teams...

revelate

Immuta + Revelate Overview

In this demo, learn how Immuta and Revelate integrate to allow any organization to share and monetize their data securely at scale.

all-data-platforms

Immuta Projects Overview

Learn how Immuta Projects, logical groupings of data sets, allow users to collaborate securely and compliantly with data use agreements and other context-based data compliance regulations.

all-data-platforms

Obtaining Insights into User Activity with Immuta Detect

In this short demo, you’ll learn how Immuta Detect enables organizations to continuously monitor and drill down into user activity on sensitive data across data platforms.

databricks-demo-library

Immuta + Databricks Overview

See how Immuta natively integrates with Databricks to deliver seamless data discovery, security, and monitoring, complete with attribute-based access control, dynamic data masking, and built-in purpose restrictions.

google-bigquery

Immuta + BigQuery Integration Overview

In this demo, you’ll see how to easily write policies in Immuta and dynamically apply them across data sets in Google BigQuery to protect sensitive information from unauthorized access.

databricks-demo-library

How to Use Immuta’s Integration with Databricks Unity Catalog

Immuta is the first Data Security Platform to natively and fully integrate with Databricks Unity Catalog to secure workloads on the Databricks Data Intelligence Platform. This means you can secure your data at scale on Databricks and unlock more value from your data. See how it works in this demo.

snowflake-demo-library

How to Secure RAG-Based GenAI Using Immuta with Snowflake Cortex

Learn how Immuta integrates with Snowflake Cortex to build policy against data being consumed by GenAI models and strengthen end-to-end control over sensitive data access. You can learn more about how Immuta supports RAG-based GenAI here.

amazon-web-services-demo-library

How Immuta Secures Amazon S3 Data

See how you can secure your Amazon S3 data with scalable, comprehensive controls using the Immuta Data Security Platform. Learn more about Immuta + Amazon S3 here.

amazon-web-services-demo-library

Enabling Secure Access to Genomic VCF Files

Discover how you can use Immuta’s integration with Amazon S3 to enable secure, controlled access to VCF files for genomics analysis. Learn more about securing genomic data. Dig deeper into Immuta + Amazon S3.

intro-to-data-security databricks-demo-library

Databricks Data Security & Access Control with Immuta

See how Immuta integrates with Databricks to provide an easy-to-use, automated solution to scale data security for Databricks. Immuta Solutions Architect Sam Carroll walks through how to automate data discovery, access control, and governance over sensitive data across Lakehouse architectures.

all-data-platforms

Attribute-Based Access Control (ABAC) Explained

This demo provides an overview of how attribute-based access control (ABAC) streamlines and simplifies the access control models of the past.

starburst

Applying Write Policies on Starburst Data

Learn how you can leverage both read and write policies to secure your Starburst Trino data using Immuta’s native integration. You can learn more about Immuta + Starburst here.

snowflake

How to Scale Cross-Organization Snowflake Data Sharing

In this blog, you’ll learn about: Snowflake data shares Considerations and complexities that can arise when “Snowflake data sharing” sensitive data How Immuta + Snowflake help simplify and scale sensitive data sharing for global organizations and can do the same for you! What is a Data Share? One of Snowflake’s major benefits...

snowflake

Implementing Snowflake Column-Level Security for PII & PHI

As sensitive data, like personally identifiable information (PII) and protected health information (PHI), becomes more widely used across industries, it is incumbent upon data teams to have mechanisms in place to protect it. Snowflake’s Column-level Security capability enables dynamic data masking of this type of sensitive data through policies that are applied at query...

alation

How to Secure Metadata with Immuta and Alation Custom Fields

amazon-web-services

How to Run SageMaker Jobs with Immuta + Amazon S3 Access Grants

snowflake

How to Manage Snowflake Fine-Grained Access Control

If Disney World were a database, we would rave about its access control strategy. It is secure: only authorized users get into the park or into any sensitive backstage areas. It is dynamic: many rides and concessions are available to the right people with the wave of a bracelet. Most...

snowflake

How to Implement Snowflake Data Masking Across Platforms

As cloud data platform adoption accelerates and organizations become more reliant on data, teams using Snowflake as the primary platform for BI must have a tool that enables data masking across Snowflake and any other platform in their data stack. This article will walk through how Immuta delivers on this need with...

snowflake

How to Implement Row-Level Security in Snowflake

Segmenting data by geographies is a common requirement for row access policies in Snowflake. Still, many data teams continue to be roadblocked when it comes to implementing complex policies for row-level security at scale – particularly for sensitive data – due to location-based data use regulations, data use agreements, and internal,...

alation

How to Implement Immuta Within Alation

Immuta is the modern data security platform that gives you the power to leverage metadata to build and automatically enforce access policies and apply dynamic data masking techniques at query time. These capabilities make Immuta a seamless fit with Alation, which many customers rely on as their enterprise-wide data catalog solution. Put simply, Immuta allows you...

databricks

How to Implement Databricks Data Masking Across Platforms

As cloud data platform adoption accelerates and organizations become more reliant on data, teams using Databricks as the primary platform for ETL and data science must have a tool that enables dynamic data masking across Databricks and any other platform in their data stack. This article will walk through how Immuta delivers on this...

azure

How to Implement Azure Data Access Control for Lakehouse Architectures

The adoption of the Data Lakehouse architecture is soaring across various industries, as the new and open paradigm combines the best elements of data lakes and data warehouses. Open file formats with transaction support, combined with low cost storage and wide adoption, enable new ways of working with data pipelines and machine...

databricks

How to Enforce Policy-As-Code for Databricks Tables

Data security is the responsibility of everyone in the organization. From ETL developers to business users and data consumers, anyone who relies on data shares a responsibility to use it appropriately. However, with several different systems and, in many cases, silos, it can often be difficult to effectively put this...

databricks

How to Enforce Databricks Row-Level Security & Cell-Level Security

Implementing row- and cell-level security by hand can be a pain, whether that means maintaining an ETL pipeline to transform raw data into “clean” data that is viewable by analysts, or maintaining a system of GRANTs on views implementing the policies for an organization. This also does not factor in...

snowflake

How To Enable Snowflake Attribute-Based Access Control

Cloud data platforms such as Snowflake provide native security and data access controls engineered for platform-specific administrators to manage roles across the organization. Snowflake leverages concepts from Discretionary Access Control (DAC) and Role-Based Access Control (RBAC) models. This provides some flexibility for and control over how users can access securable objects by managing a...

governance-security

How to Build a Zero Trust Policy

Zero trust is the future of data security. As the popularity of remote work, bring your own device (BYOD), and cloud-based systems and applications grow, traditional perimeter security measures are no longer adequate. Zero trust helps organizations protect their digital assets in a perimeterless environment. In this guide, we’ll explain...

discovery-classification

What is Data Segmentation?

Much of today’s data use is focused on how much data we can collect, store, analyze, and derive insights from to help drive our objectives and gain value. But what happens once this plethora of data is amassed? How can users access the data they need when it is stored...

discovery-classification

What is Data Discovery?

Over the past two decades, data has become an incredibly valuable asset. For most companies, it’s the key to better understanding and engaging with customers, making informed business decisions, and improving products and services. But at a time when so much data is being created — as much as 3.5 quintillion...

discovery-classification

What is Data Classification?

Data is one of the most important assets an organization holds, yet it can also be one of the most delicate. While sensitive data use is now all but ubiquitous, data leaks and breaches are becoming more common and costly. Regulators and governments are taking note, and implementing standards in...

governance-security

What is Data Access Governance?

At a time when vast amounts of highly sensitive data are being collected and used, and as data breaches become increasingly common and costly, being able to manage who has access to your organization’s data is more important than ever. However, the volume of data, number of users, speed of...

discovery-classification

What is Automated Data Discovery?

As organizations leverage growing amounts of data for business-driving insights, they are met with the fast-paced evolution of data compliance laws and regulations. According to Gartner, 75% of the global population will have its personal data covered under privacy regulations by the end of 2024. This only underscores the necessity to understand...

intro-to-data-security

What is a Data Product?

We’re living in the age of unprecedented data growth. We’ll soon be producing a staggering 181 zettabytes of data globally each year. But raw data itself doesn’t equal success. That’s where data products come in, transforming these massive volumes of information into actionable insights and tangible business value. In this...

monitoring-audit-compliance

What User Behavior Analytics Can Tell You About Data Threats

Behavioral analytics has long been a staple of marketing strategies. But as data use — and sensitive data use in particular — becomes more ubiquitous, its role in data security strategies is becoming more prominent. Data users’ behavior can reveal a lot about their intentions. But it can be challenging...

governance-security

How to Implement Row-Level Security Across Platforms

In a world where AI, personalization, and fast-moving tech rule, granular data insights are the competitive advantage. But to actually tap into them – confidently and compliantly – your access controls need to be equally granular. In this guide, we will explore how row-level security works and the benefits it...

artificial-intelligence

Why Retrieval-Augmented Generation (RAG) Is Revolutionizing GenAI

Generative AI has quickly emerged as a groundbreaking technology – and one that’s being adopted faster than the policies dictating how it’s used. In a survey of 700+ data professionals, 54% reported that their organization already leverages at least four AI systems or applications – but 80% say AI is making...

governance-security

What is RBAC (Role-Based Access Control) – And is it Right For You?

Much like the data they were meant to protect, the earliest forms of data access control were relatively rudimentary. Models like mandatory access control (MAC) and discretionary access control (DAC) were effective for the information and practices of the 1960s and 1970s, targeted more at securing the data rather than sharing it....

governance-security

Privacy Controls for Modern Data Stacks: A Complete Overview

It’s nearly impossible to participate in today’s society without having to share your personal information. We routinely offer up our data when we visit the doctor, shop online,  do our taxes, and in hundreds of other instances. Most times, this happens without a second thought – but as privacy violations...

threat-risk-management

What Is Managed Detection and Response?

Modern hybrid and multi-cloud environments are complex, making them inherently vulnerable. Managed detection and response (MDR) solutions allow teams to proactively identify and quickly mitigate threats. They combine the best technology with human expertise to optimize threat hunting, monitoring, and response. With MDR, even resource-limited companies can effectively protect their...

threat-risk-management

Insider Risk Management: What CISOs Need to Know

One of the most significant threats to an organization’s data security can appear innocuous: employees, contractors, and partners who have authorized access. Security incidents that originate with insiders are becoming exponentially more common, making insider risk management a priority for today’s companies. A strategic mix of technology, policies, and procedures...

intro-to-data-security

How to Leverage Secure Data Collaboration Across Teams

Building a new apartment complex requires a lot of moving parts. Contractors each provide their own schematics, pricing, and labor, the city needs to review the plans and grant a building permit, and the commissioner must be kept up to date on the progress and total cost. If the stakeholders...

monitoring-audit-compliance

HIPAA Expert Determination: Everything You Need to Know

For 13 years and counting, the healthcare industry has topped the list for the most frequent and expensive data breaches. According to IBM’s 2023 Cost of a Data Breach Report, the cost of healthcare data breaches has risen more than 53% since 2020, reaching an average of $10.93M per incident. In spite of...

governance-security

Fine-Grained Authorization: Data Security with Precision

When we think of the term “authorization,” physical restrictions often come to mind. From office buildings to airports, “Authorized Personnel Only” signs tell us where we should and shouldn’t be. Authorization in data ecosystems, while equally important, is rarely as straightforward – and that’s creating an easy-to-target security gap. Verizon’s 2023...

intro-to-data-security

Data Security Posture Management Explained

The rapid adoption of cloud-based technologies, data democratization initiatives, and the demise of the traditional network perimeter are crucial to doing business in the modern world. But these advances have created new security vulnerabilities. To mitigate the security risks inherent in highly distributed, multi-cloud environments, organizations require a robust data security stance....

threat-risk-management

Data Risk Management 101

Security breaches and cyberattacks have become all too common in recent years. In the first half of 2022, an estimated 236.1 million ransomware attacks were reported worldwide. Meanwhile, between 2020 and 2021 the average number of attacks per company increased from 206 to 270. Perhaps most alarming of all is that the cost...

monitoring-audit-compliance

Data Observability vs. Data Detection

The modern data stack is continually evolving, and confusion can arise when new frameworks experience a sudden spike in popularity — or when complementary solutions with overlapping functionalities enter the market. Recently, data observability has emerged as a new way of thinking about data quality and as a new technology...

intro-to-data-security

Data Mesh Security Best Practices

The data mesh framework places data ownership in the hands of those who know it best — the domain-level experts. It allows those closest to the data to create and share data products independent of the data team, accelerating insights and innovation. But the approach also creates a unique set...

governance-security

What Is a Data Loss Prevention Policy?

Data loss can trigger a cascade of adverse consequences for businesses, resulting in financial and reputational damage. Today’s organizations use data loss prevention (DLP) policies to govern access to their data and safeguard its confidentiality and integrity. In this guide, we’ll explore the primary causes of data loss, recommend best...

governance-security

Data Governance vs. Data Management

Thanks to the ubiquity of cloud storage and computing, coupled with the explosion in AI and ML applications, the data landscape is shifting before our eyes. Technologies that worked seamlessly just a decade ago – some even more recently – can no longer keep up with the speed and scale...

governance-security

7 Data Governance Challenges & How to Beat Them

Data governance may seem fairly straightforward, and for some companies, is even considered a nice-to-have. But Forrester research found that less than 10% of organizations have advanced data insights – and the reason is insufficient data governance. If data governance is such a well-known concept, why is it so difficult to put...

discovery-classification

How to Choose a Data Discovery Solution

Data discovery may seem like a no-brainer, but the massive growth of data use and assets have made it a much more complicated practice than just a decade ago. Manual processes can no longer efficiently keep up with data discovery and management, and the downstream effects could spell trouble for...

monitoring-audit-compliance

A Guide to Data Compliance Regulations

As with data resources and platforms, data regulations must constantly evolve to suit the most current data use cases for today’s organizations. Following the wide-reaching application of laws like the General Data Protection Regulation (GDPR) in 2018, the number of data compliance regulations have snowballed. In fact, 157 countries enacted some form of data privacy law...

threat-risk-management

Cloud SIEM: A Blueprint for Proactive Monitoring & Response

When a data breach occurs, time is an invaluable asset. The longer an intruder goes undetected, the more damage they can do. But the faster an organization discovers an incident, the sooner the threat can be neutralized. A cloud security information and event management (SIEM) solution serves as an early...

intro-to-data-security

Cloud Data Security Best Practices

The cloud is now ubiquitous for organizations that compete with data. But, as with any other commodity, it comes with risk. Do the time and cost savings, flexibility, and capacity that the cloud offers outweigh the threat of becoming the next headline-generating data breach or fine? The answer is yes,...

intro-to-data-security

Cloud Data Governance 101

If you’re like most organizations, your data is scattered across the vast expanse of the cloud, accessible from anywhere at any time. Theoretically, this is ideal – having data at your fingertips allows you to work collaboratively, remotely, and efficiently. But along with that freedom comes a slew of risks...

monitoring-audit-compliance

How to Build an Audit Logging and Monitoring Policy

According to IBM’s 2022 Cost of a Data Breach Report, just under half of all data breaches take place in the cloud, with an average per-incident cost of $4.24 million dollars. Although hybrid and multi-cloud environments are resilient and highly adaptable, they also expand the attack surface and make monitoring activity...

intro-to-data-security

An Introduction to Data Security Solutions

With 95% of businesses leveraging data for decision-making, there’s no question that data isn’t just a nice-to-have tool – it’s a must-have to compete in today’s market. But managing data access is far from straightforward. As data volumes, users, regulations, and threats proliferate, 33% of data professionals say that a lack of visibility into data sharing and usage...

governance-security

Adaptive Data Governance: What It Is & Why You Need It

The physician and psychoanalyst John Lilly once said, “our only security is our ability to change.” While this adage is true in every facet of life, it is especially pertinent in business. Failure to change allows competitors to find faster, better, smarter, and newer ways of doing things – all...

governance-security

RBAC vs. ABAC Policy Management: What Data Teams Should Know

No matter the type, amount, or desired application of your organization’s data, all data users have one common requirement: accessibility. Without access, any repository of data would sit useless in your on-premises or cloud storage platforms. By providing secure, efficient access to this information, organizations can ensure that their resources...

data-architectures

A Guide to Decentralized Data Architectures

Traditional data architectures have often been structured like medieval towns – with resources, workers, and supplies kept in centralized locations that are easy to control and defend. This is not without reason, as storing, managing, and accessing data from a single repository can enable your organization with consistent controls over...

Ready to get started?