Skip to content
start for free
Product
Solutions
Why Snowflake
Resources
Developers
Pricing
The Snowflake Platform
Develop AI products, apps and more on a fully managed platform that securely connects businesses globally — across any type or scale of data.
Analytics icon
Analytics
AI/ML icon
AI
Data engineering icon
Data Engineering
Collaboration icon
Applications & Collaboration
Featured Capabilities
Cortex AI
Instant access to industry-leading LLMs
Data Clean Rooms
Privacy-preserving data collaboration
Native Apps
End-to-end, Snowflake-native app creation and distribution
Horizon
Built-in compliance, security, privacy and access
Marketplace
Third-party data and AI products for trial and purchase
Notebooks
Interactive dev environment for data and AI teams
Snowflake ML
Streamlined model development and MLOps from a centralized UI
Snowpark
Libraries and code execution environments that run Python and more
Streamlit
Framework for transforming Python scripts into web apps
Featured Open Source Technologies
Arctic LLM
An open, efficient LLM for enterprise AI apps
Open Catalog
Manage and govern data across many engines and storage locations
Back
INDUSTRIES
Advertising, Media & Entertainment
Financial Services
Healthcare & Life Sciences
Manufacturing
Public Sector
Retail & Consumer Goods
Technology
Telecom
Travel & Hospitality
DEPARTMENTS
Finance
IT
Marketing
Cybersecurity
Enablement Solutions
Cloud icon
Migrate to the AI Data Cloud
Confident migration to a unified platform
Migrate icon
Professional Services
Snowflake experts to help you accelerate and achieve business goals
PARTNER SOLUTIONS
Partner Network icon
Snowflake Partner Network
Programs with product, solutions and cloud partners
Partner Finder icon
Partner Finder
Partners, apps and solutions for enhanced deployment
Calendar icon
Event Partnership Opportunities
Live and virtual events
Back
Why Snowflake
Collaborate locally and globally to reveal new insights, create previously unforeseen business opportunities, and identify your customers with seamless experiences.
Customer icon
Customers
Case studies and videos showcasing how global organizations use Snowflake
Cloud icon
The AI Data Cloud Explained
Learn how to connect, share and integrate the data and apps on the AI Data Cloud
Certification icon
Security Hub
Comprehensive security through built-in features, robust cloud infrastructure protection, and more.
コストの最適化:
Cost and Performance Optimization
Maximize economic value through minimizing TCO and continuously optimizing price for performance.
Back
Connect
Blog
Events
Support
Contact us
Learn
Notebooks icon
Resource Library
Ebooks, videos, white papers and more
Training icon
Training
Overview of Snowflake's educational offerings
Webinars icon
Webinars
Expert-led discussions and demos across industries and use cases
Certification icon
Certifications
Snowflake's technical industry professional certifications
Live Demo icon
Live Demos
Weekly product demos showcasing key features and live Q&A
Education icon
Snowflake University
Training courses for all levels, on-demand or instructor-led
Hands-on Labs icon
Hands-On Labs
Instructor-led virtual workshops for exploring key Snowflake features
Back
Build
Developers icon
Snowflake for Developers
Overview of the dev resources you need to build and scale
Solution Center icon
Solutions Center
Reference architectures, use cases and best practices
Download icon
Downloads
The latest software versions, drivers, libraries and relevant docs
Learn
Docs icon
Documentation
Reference docs, guides, tutorials and announcements
Quickstart icon
Quickstarts
Tutorials to get up and running with Snowflake
Open Source icon
Open Source
Key projects Snowflake engineers maintain and support
Northstar logo
Builder Education
Online and in-person classes and workshops to upskill on Snowflake
Connect
Developers icon
Engineering Blog
Snowflake’s technical leaders on what, why and how they build features
Partner Network icon
Community
Tips, tricks and discussion with fellow Snowflake developers
Back
Back

Language

Back
英文
English
Português
Italiano
한국어
日本語
Español
Deutsch
Français
Sign in

Snowflake Data Clean Rooms Managed Account Offering Security Addendum

Last Updated: April 30, 2024 | Previous Versions

This Snowflake Data Clean Rooms Managed Account Offering Security Addendum (the “CMA Offering Security Addendum”) is incorporated into and made a part of the Snowflake Data Clean Rooms Managed Account Offering Terms between Snowflake and Customer that references this document (the “Agreement”). Any capitalized terms used but not defined herein shall have the meaning set forth in the Agreement. In the event of any conflict between the terms of the Agreement and this CMA Offering Security Addendum, this CMA Offering Security Addendum shall govern.

Snowflake utilizes infrastructure-as-a-service cloud providers as further described in the Agreement and/or Documentation (each, a “Cloud Provider”) and provides the CMA Offering to Customer using a VPC/VNET and storage hosted by the applicable Cloud Provider (the “Cloud Environment”).

Snowflake maintains a comprehensive documented security program based on NIST 800-53 (or industry recognized successor framework), under which Snowflake implements and maintains physical, administrative, and technical safeguards designed to protect the confidentiality, integrity, availability, and security of the CMA Offering (the “CMA Offering Security Program”), including, but not limited to, as set forth below. Snowflake regularly tests and evaluates its CMA Offering Security Program, and may review and update its CMA Offering Security Program as well as this CMA Offering Security Addendum, subject to section 13.5 (Changes to Terms) of the Agreement.

1. SYSTEM AND NETWORK SECURITY.

1.1. Access Controls.

1.1.1. All Snowflake personnel access to the Cloud Environment is via a unique user ID, consistent with the principle of least privilege, and requires a VPN, as well as multi-factor authentication and passwords meeting or exceeding PCI-DSS length and complexity requirements.

1.1.2. Snowflake personnel will not access CMA Data except (i) as reasonably necessary to provide the CMA Offering under the Agreement or (ii) to comply with the law or a binding order of a governmental body.

1.2. Endpoint Controls. For access to the Cloud Environment, Snowflake personnel use Snowflake-issued laptops which utilize security controls that include, but are not limited to, (i) disk encryption, (ii) endpoint detection and response (EDR) tools to monitor and alert for suspicious activities and Malicious Code (as defined below), and (iii) vulnerability management in accordance with Section 1.7.3 (Vulnerability Management).

1.3. Separation of Environments. Snowflake logically separates production environments from development environments. The Cloud Environment is both logically and physically separate from Snowflake’s corporate offices and networks.

1.4. Firewalls / Security Groups. Snowflake shall protect the Cloud Environment using industry standard firewall or security groups technology with deny-all default policies to prevent egress and ingress network traffic protocols other than those that are business-required.

1.5. Hardening. The Cloud Environment shall be hardened using industry-standard practices to protect it from vulnerabilities, including by changing default passwords, removing unnecessary software, disabling or removing unnecessary services, and regular patching as described in this CMA Offering Security Addendum.

1.6. Monitoring & Logging. Monitoring tools or services, such as host-based intrusion detection tools, are utilized to log certain activities and changes within the Cloud Environment. These logs are further monitored, analyzed for anomalies, and are securely stored to prevent tampering for at least one year.1.7. Vulnerability Detection & Management.

1.7. Vulnerability Detection & Management.

1.7.1. Anti-Virus & Vulnerability Detection. The Cloud Environment leverages advanced threat detection tools with daily signature updates, which are used to monitor and alert for suspicious activities, potential malware, viruses and/or malicious computer code (collectively, “Malicious Code”). Snowflake has no obligation to monitor CMA Data for Malicious Code.

1.7.2. Penetration Testing & Vulnerability Detection. Snowflake regularly conducts penetration tests and engages one or more independent third parties to conduct penetration tests of the CMA Offering at least annually. Snowflake also runs weekly vulnerability scans for the Cloud Environment using updated vulnerability databases.

1.7.3. Vulnerability Management. Vulnerabilities meeting defined risk criteria trigger alerts and are prioritized for remediation based on their potential impact to the CMA Offering. Upon becoming aware of such vulnerabilities, Snowflake will use commercially reasonable efforts to address private and public (e.g., U.S.-CERT announced) critical and high vulnerabilities within 30 days, and medium vulnerabilities within 90 days. To assess whether a vulnerability is ‘critical’, ‘high’, or ‘medium’, Snowflake leverages the National Vulnerability Database’s (NVD) Common Vulnerability Scoring System (CVSS), or where applicable, the U.S.-CERT rating.

2. ADMINISTRATIVE CONTROLS.

2.1. Personnel Security. Snowflake requires criminal background screening on its personnel as part of its hiring process, to the extent permitted by applicable law.

2.2. Personnel Training. Snowflake maintains a documented security awareness and training program for its personnel, including, but not limited to, onboarding and on-going training.

2.3. Personnel Agreements. Snowflake personnel are required to sign confidentiality agreements. Snowflake personnel are also required to sign Snowflake’s information security policy, which includes acknowledging responsibility for reporting security incidents.

2.4. Personnel Access Reviews & Separation. Snowflake reviews the access privileges of its personnel to the Cloud Environment at least quarterly, and removes access on a timely basis for all separated personnel.

2.5. Snowflake Risk Management & Threat Assessment. Snowflake’s risk management process is modeled on NIST 800-­53 and ISO 27001. Snowflake’s security committee meets regularly to review reports and material changes in the threat environment, and to identify potential control deficiencies in order to make recommendations for new or improved controls and threat mitigation strategies.

2.6. External Threat Intelligence Monitoring. Snowflake reviews external threat intelligence, including U.S.-CERT vulnerability announcements and other trusted sources of vulnerability reports. U.S.-CERT announced vulnerabilities rated as critical or high are prioritized for remediation in accordance with Section 1.7.3 (Vulnerability Management).

2.7. Change Management. Snowflake maintains a documented change management program for the CMA Offering.

2.8. Vendor Risk Management. Snowflake maintains a vendor risk management program for vendors that process CMA Data (as applicable) designed to ensure each vendor maintains security measures consistent with Snowflake’s obligations in this CMA Offering Security Addendum.

3. PHYSICAL & ENVIRONMENTAL CONTROLS.

3.1. Cloud Environment Data Centers. To ensure the Cloud Provider has appropriate physical and environmental controls for its data centers hosting the Cloud Environment, Snowflake regularly reviews those controls as audited under the Cloud Provider’s third-party audits and certifications. Each Cloud Provider shall have a SOC 2 Type II annual audit and ISO 27001 certification, or industry recognized equivalent frameworks. Such controls, shall include, but are not limited to, the following:

3.1.1.   Physical access to the facilities are controlled at building ingress points;

3.1.2.   Visitors are required to present ID and are signed in;

3.1.3.   Physical access to servers is managed by access control devices;

3.1.4.   Physical access privileges are reviewed regularly;

3.1.5.   Facilities utilize monitor and alarm response procedures;

3.1.6.   Use of CCTV;

3.1.7.   Fire detection and protection systems;

3.1.8.   Power back-up and redundancy systems; and

3.1.9.   Climate control systems.

3.2. Snowflake Corporate Offices. Snowflake’s technical, administrative, and physical controls for its corporate offices covered by its ISO 27001 certification, shall include, but are not limited to, the following:

3.2.1. Physical access to the corporate office is controlled at office ingress points;

3.2.2. Badge access is required for all personnel and badge privileges are reviewed regularly;

3.2.3.  Visitors are required to sign in;

3.2.4.  Use of CCTV at building ingress points;

3.2.5.  Tagging and inventory of Snowflake-issued laptops and network assets;

3.2.6.  Fire detection and sprinkler systems; and

3.2.7.  Climate control systems.

4. INCIDENT DETECTION & RESPONSE.

4.1. Security Incident Reporting. If Snowflake becomes aware of a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to CMA Data (a “Security Incident”), Snowflake shall notify Customer without undue delay after becoming aware. Snowflake’s notification shall be sent to the email provided by Customer to Snowflake for such purposes, and where no such email is provided, Customer acknowledges that the means of notification shall be at Snowflake’s reasonable discretion and Snowflake’s ability to timely notify shall be negatively impacted.

4.2. Investigation. In the event of a Security Incident as described above, Snowflake shall promptly take reasonable steps to contain, investigate, and mitigate any Security Incident. Any logs determined to be relevant to a Security Incident, shall be preserved for at least one year.

4.3. Communication and Cooperation. Snowflake shall provide Customer timely information about the Security Incident to the extent known to Snowflake, including, but not limited to, the nature and consequences of the Security Incident, the measures taken and/or proposed by Snowflake to mitigate or contain the Security Incident, the status of Snowflake’s investigation, a contact point from which additional information may be obtained, and the categories and approximate number of data records concerned. Notwithstanding the foregoing, Customer acknowledges that because Snowflake personnel may not have visibility to the content of CMA Data (as applicable), it may be unlikely that Snowflake can provide information as to the particular nature of the CMA Data (as applicable), or where applicable, the identities, number, or categories of affected data subjects. Communications by or on behalf of Snowflake with Customer in connection with a Security Incident shall not be construed as an acknowledgment by Snowflake of any fault or liability with respect to the Security Incident.

5. CUSTOMER RIGHTS & SHARED SECURITY RESPONSIBILITIES.

5.1. Customer Penetration Testing. Customer may provide a written request for a penetration test of its Managed Account (“Pen Test”) by submitting such request via a support ticket. Following receipt by Snowflake of such request, Snowflake and Customer shall mutually agree in advance on details of such Pen Test, including the start date, scope and duration, as well as reasonable conditions designed to mitigate potential risks to confidentiality, security, or other potential disruption of the CMA Offering or Snowflake’s business. Pen Tests and any information arising therefrom are deemed Snowflake’s Confidential Information. If Customer discovers any actual or potential vulnerability in connection with a Pen Test, Customer must immediately disclose it to Snowflake and shall not disclose it to any third party.

5.2. Customer Audit Rights.

5.2.1. Upon written request and at no additional cost to Customer, Snowflake shall provide Customer, and/or its appropriately qualified third-party representative (collectively, the “Auditor“), access to (i) Snowflake’s most recently completed industry standard security questionnaire, such as a SIG or CAIQ and (ii) data flow diagrams for the CMA Offering (collectively with Third-Party Audits, “Audit Reports”).

5.2.2. Customer may also send a written request for an audit of Snowflake’s applicable controls, including inspection of its facilities. Following receipt by Snowflake of such request, Snowflake and Customer shall mutually agree in advance on the details of the audit, including the reasonable start date, scope and duration of and security and confidentiality controls applicable to any such audit. Snowflake may charge a fee (rates shall be reasonable, taking into account the resources expended by Snowflake) for any such audit. Audit Reports, any audit, and any information arising therefrom shall be considered Snowflake’s Confidential Information.

5.2.3. Where the Auditor is a third-party (or Customer is using a third-party to conduct an approved Pen Test under Section 5.2.1), such third party may be required to execute a separate confidentiality agreement with Snowflake prior to any audit, Pen Test, or review of Audit Reports, and Snowflake may object in writing to such third party if in Snowflake’s reasonable opinion the third party is not suitably qualified or is a direct competitor of Snowflake. Any such objection by Snowflake will require Customer to appoint another third party or conduct such audit, Pen Test, or review itself. Any expenses incurred by an Auditor in connection with any review of Audit Reports, or an audit or Pen Test, shall be borne exclusively by the Auditor.

5.3. Shared Security Responsibilities. Without diminishing Snowflake’s commitments in this CMA Offering Security Addendum, Customer agrees:

5.3.1. Snowflake has no obligation to assess the content, accuracy or legality of CMA Data, including to identify information subject to any specific legal, regulatory or other requirement and Customer is responsible for making appropriate use of the CMA Offering to ensure a level of security appropriate to the particular content of CMA Data, pseudonymization of CMA Data, and backing-up CMA Data;

5.3.2. Customer is responsible for managing and protecting its credentials, including but not limited to (i) ensuring that all Users keep credentials confidential and not share such information with unauthorized parties, (ii) promptly reporting to Snowflake any suspicious activities related to the CMA Offering (e.g., a user credential has been compromised), and (iv) maintaining appropriate password uniqueness, length, complexity, and expiration.

Previous Versions

2024

March 25, 2024 – Snowflake Data Clean Rooms Security Addendum

March 6, 2024 – Snowflake Samooha Offering Security Addendum

Product
PRODUCT CATEGORIES
Platform
Analytics
AI
Data engineering
Applications & Collaboration
FEATURED CAPABILITIES
Cortex AI
Data Clean Rooms
Horizon
Marketplace
Native Apps
Notebooks
Snowpark
Streamlit
Snowflake ML
FEATURED OPEN SOURCE TECHNOLOGIES
Arctic LLM
Open Catalog
Solutions
INDUSTRIES
Advertising, Media and Entertainment
Financial Services
Healthcare & Life Sciences
Manufacturing
Public Sector
Retail & Consumer Goods
Technology
Telecom
Travel & Hospitality
DEPARTMENTS
Marketing
IT
Finance
Cybersecurity
ENABLEMENT SOLUTIONS
Migrate to the AI Data Cloud
Professional services
PARTNER SOLUTIONS
Snowflake Partner Network
Partner Finder
Event partnership opportunities
Why Snowflake
Why Snowflake
All Customers
Snowflake Security Hub
The AI Data Cloud Explained
Resources
CONNECT
Blog
Engineering blog
Community
Events
Support
Contact
LEARN
Resource library
Training
Webinars
Certifications
Live demos
Snowflake University
Hands-on labs
Guides
Trending
Developers
Developers Overview
Solutions Center
Open Source
Builder Education
Downloads
Company
About Snowflake
Investor Relations
Leadership & Board
Careers
Newsroom
ESG
Snowflake Ventures
End Data Disparity
Pricing
Pricing options
Cost & performance optimization
Snowflake performance index

Sign Up for Our Newsletter

© 2025 Snowflake Inc. All Rights Reserved
privacy notice
site terms
cookie settings
do not share my personal information
legal

If You’d Rather Not Receive Future Emails From Snowflake, Unsubscribe Here Or Customize Your Communication Preferences