Log Sources for Security Monitoring

Customers can monitor their Snowflake deployment for potential indicators of compromise by integrating Snowflake log sources with their Security Information and Event Monitoring (SIEM) solution. This guide documents the security identifiers and the Information Schema and Account Usage columns that Snowflake recommends customers monitor. In addition, this publication maps columns to the MITRE ATT&CK SaaS Matrix, an industry framework that helps security analysts implement detection and response controls that align to their organization's incident response procedures.

Security Identifiers and Views

Security Identifier/ViewColumnsSchema LocationLatencyMITRE ATT&CK
APPLICABLE_ROLESGRANTEE
ROLE_NAME
ROLE_OWNER
IS_GRANTABLE
INFORMATION_SCHEMAn/aT1060- Permission Group Discovery
T1087 - Account Discovery
STAGESSTAGE_NAME
CREATED
LAST_ALTERED
INFORMATION_SCHEMAn/aT1213- Data Collection/ Exfiltration
T1074 Data Staged
USAGE_PRIVILEGESGRANTOR
GRANTEE
PRIVILEGE_TYPE
IS_GRANTABLE
CREATED
INFORMATION_SCHEMAn/aT1078- Privilege Escalation
OBJECT_PRIVILEGESGRANTOR
GRANTEE
PRIVILEGE_TYPE
IS_GRANTABLE
CREATED
INFORMATION_SCHEMAn/aT1078- Privilege Escalation
ACCESS_HISTORYQUERY_ID
QUERY_START_TIME
USER_NAME
DIRECT_OBJECTS_ACCESSED
BASE_OBJECTS_ACCESSSED
ACCOUNT_USAGE3 hoursT1078- Valid Accounts
COPY_HISTORYAll Applicable ColumnsACCOUNT_USAGE2 HoursT1213- Data Collection
T1074 - Data Staged
DATA_TRANSFER_HISTORYSTART_TIME
END_TIME
SOURCE_CLOUD
SOURCE_REGION
TARGET_CLOUD
TARGET_REGION
ACCOUNT_USAGE2 HoursT1213- Data Collection
T1074 - Data Staged
GRANTS_TO_ROLESCREATED_ON
MODIFIED_ON
PRIVILEGE
GRANTED_ON
NAME
GRANTED_TO
GRANTEE_NAME
GRANT_OPTION
GRANTED_BY
DELETED_ON
ACCOUNT_USAGE2 HoursT1078- Privilege Escalation
GRANTS_TO_USERSCREATED_ON
DELETED_ON
ROLE
GRANTED_TO
GRANTEE_NAME
GRANTED_BY
ACCOUNT_USAGE2 hoursT1078- Privilege Escalation
LOGIN_HISTORYEVENT_TIMESTAMP
EVENT_TYPE
USER_NAME
CLIENT_IP
REPORTED_CLIENT_TYPE
FIRST_AUTHENTICATION_FACTOR
SECOND_AUTHENTICATION_FACTOR
IS_SUCCESS
ACCOUNT_USAGE2 hoursT1078.004- Cloud Accounts
MASKING_POLICIESPOLICY_NAME
CREATED
LAST_ALTERED
DELETED
ACCOUNT_USAGE2 hoursT1080- Taint Shared Content
TA0005 - Defense Evasion
QUERY_HISTORYAll Applicable ColumnsACCOUNT_USAGE45 minutesTA0003 - Persistence
TA0003 - Valid Accounts
ROLESCREATED_ON
DELETED_ON
NAME
ACCOUNT_USAGE2 hoursTA0003 - Persistence
ROW_ACCESS_POLICIESPOLICY_NAME
CREATED
LAST_ALTERED
DELETED
ACCOUNT_USAGE2 hoursT1080- Taint Shared Content
TA0005 - Defense Evasion
SESSIONSSESSION_ID
CREATED_ON
USER_NAME
AUTHENTICATION_METHOD
LOGIN_EVENT_ID
CLIENT_APPLICATION_VERSION
CLIENT_APPLICATION_ID
CLIENT_ENVIORNMENT
CLIENT_BUILD_ID
CLIENT_VERSION
ACCOUNT_USAGE3 hoursTA0003 - Persistence
T1550 - Use Alternate Authentication Material
STAGESSTAGE_NAME
CREATED
LAST_ALTERED
DELETED
ACCOUNT_USAGE2 hoursT1074 - Data Staged
USERSAll Applicable ColumnsACCOUNT_USAGE2 hoursTA0003 - Persistence
TA0003 - Valid Accounts
DATABASESDATABASE_NAME
CREATED
LAST_ALTERED
DELETED
ACCOUNT_USAGE2 hoursT1074 - Data Staged
TABLESTABLE_OWNER
CREATED
LAST_ALTERED
DELETED
ACCOUNT_USAGE2 hoursT1074 - Data Staged