Snowflake abnormal usage of OAuth access token

This rule is part of a beta feature. To learn more, contact Support.
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください

Goal

Detect abnormal OAuth access token usage in your Snowflake environment.

Strategy

This rule allows you to detect when an account authenticates with an OAuth access token outside an automated service/driver.

OAuth access tokens act like digital keys that grant access to protected resources. If an attacker compromises a user account, they might steal the associated access token.

By reviewing access token usage during an incident, you can identify unusual activity patterns. This could involve:

  • Access tokens being used from unexpected locations (attacker’s IP address).
  • Access tokens being used to access unauthorized resources.
  • A sudden spike in access token usage.

Triage and response

  1. Inspect the logs to see if the IP address is aligned with expected user or service account behavior.
  2. If the IP address has not been seen before and is followed by query activity, investigate the actions taken.
  3. If the account was compromised, recreate the access token.