Snowflake Management, Governance & Collaboration
Emily Melhuish
Technical Curriculum Developer, Snowflake

| At Rest | In Transit | |
|---|---|---|
| Standard | AES-256 | TLS 1.2 or higher |
| Key rotation | Automatic | N/A |
| Scope | Stored data | Client and internal traffic |

| Encryption model | Description |
|---|---|
| Snowflake-managed keys | Default. Snowflake manages encryption keys on your behalf. Sufficient for most organizations. |
| Customer-managed keys (Tri-Secret Secure) | For organizations with sensitive data. Customer holds the master encryption key through AWS KMS, Azure Key Vault, or GCP KMS. |



CREATE ALERT claro_failed_login_alert
WAREHOUSE = claro_wh
SCHEDULE = '60 MINUTE'
IF (EXISTS (
SELECT 1
FROM SNOWFLAKE.ACCOUNT_USAGE.LOGIN_HISTORY
WHERE error_code IS NOT NULL
AND event_timestamp >= DATEADD('hour', -1, CURRENT_TIMESTAMP())
))
THEN CALL SYSTEM$SEND_SNOWFLAKE_NOTIFICATION(...);

Snowflake Management, Governance & Collaboration