Amazon Redshift Data Access Control

Immuta is an AWS Advanced Technology Partner, providing Amazon Redshift customers with advanced security, access control, auditing and privacy management. Data-driven organizations on Amazon Redshift can now add Immuta to easily store, analyze and share even the most sensitive data sets.

Access Control

Apply dynamic row-level security, column-level security and cell-level protection.

Centralized Access
Control and Data Security

Reduce risk with consistent access control across AWS and non-AWS database services.

Data Masking

Discover and protect sensitive data for use.


Fine-Grained Access Control

Controlling access to data within Amazon Redshift can be complex, requiring DDL operations to grant access to specific columns for hundreds of roles or creating table views for row-level filtering to define data access. With Immuta, you can streamline access control by automatically governing who can see and use what data. Data engineers use Immuta to create modern, fine-grained access control policies — across all data. When users query data from Amazon Redshift, Immuta policies are dynamically enforced to simplify role management.


Centralized Access Control and Data Security

While the market is filled with data catalog offerings to centralize access, most do not enable consistent enforcement of access control and data security policies across Amazon Redshift and other data sources. Immuta provides consistent data classification and dynamic policy enforcement across cloud database services on AWS, such as Databricks, Athena and AWS RDS services, as well as those on Azure or GCP. Data engineers can simplify management and reduce risk across the cloud data platforms.


Dynamic Data Masking

Data engineers must ensure analytics data and data use are compliant with complex, growing sets of regulatory and business rules. Immuta and Amazon Redshift provide a dynamic approach to sensitive data classification, discovery and protection using advanced math-based data masking, randomization and anonymization techniques that are fully auditable. Policies can be enforced dynamically based on geography, time duration, user attributes such as clearance level and more, without copying data or managing hundreds of roles.

Ready to get started?

Request a Demo Build a Policy Now