Enforcing Redshift Attribute-Based Access Control
Organizations are increasingly adopting data lakehouse architectures to reap the benefits of added flexibility,...
How to Enforce Policy-As-Code for Databricks Tables
Data security is the responsibility of everyone in the organization. From ETL developers to...
How to Enable User Impersonation from Tableau to Snowflake
Publishing to Tableau Server or Tableau Online is a powerful way to enable all...
How to Enforce Databricks Row-Level Security & Cell-Level Security
Implementing row- and cell-level security by hand can be a pain, whether that means...
How to Implement Azure Data Access Control for Lakehouse Architectures
The adoption of the Data Lakehouse architecture is soaring across various industries, as the...
How to Implement Databricks Data Masking Across Platforms
As cloud data platform adoption accelerates and organizations become more reliant on data, teams...
How to Anonymize Data with Databricks Access Control
Organizations with large workforces are increasingly analyzing employee data using cloud data platforms such...
How to Manage Snowflake Fine-Grained Access Control
If Disney World were a database, we would rave about its access control strategy....
How to Implement Snowflake Data Masking Across Platforms
As cloud data platform adoption accelerates and organizations become more reliant on data, teams...
How to Implement Row-Level Security in Snowflake
Segmenting data by geographies is a common requirement for row access policies in Snowflake....
How To Enable Snowflake Attribute-Based Access Control
Cloud data platforms such as Snowflake provide native security and data access controls engineered for platform-specific administrators to...
Enforce Compliance & Audit Reports for Data Sharing in Snowflake
Data use agreements (DUAs) are vital to ensuring individuals’ data is used compliantly and...