Snowflake Integration
Panther is configured to write processed log data to an AWS-based Snowflake database cluster.
Integrating Panther with Snowflake enables Panther data to be used with your Business Intelligence tools to make dashboards tailored to your operations. In addition, you can join Panther data (e.g., Panther alerts) to your business data, enabling assessment of your security posture with respect to your organization.
For example, you can tally alerts by organizational division (e.g., Human Resources) or by infrastructure (e.g., Development, Test, Production).
Panther uses Snowpipe to copy the data into your Snowflake cluster.

Configuration Overview

SaaS

For Panther SaaS customers, a Snowflake instance is automatically provisioned and we take care of setup and maintenance for you. You're all set!
For SaaS customers who wish to share data between the Panther SaaS Snowflake account and their own internal Snowflake account, this can be accomplished by contacting your Panther support team.
For SaaS customers who wish to access their SaaS configuration to use the data in BI reporting, but do not have their own corporate Snowflake account, our support team can provision special access roles for your use.

Bring Your Own Snowflake (BYOSF)

If you are an existing Snowflake customer, Panther can be configured to use one of your own Snowflake accounts. We call this Bring Your Own Snowflake (BYOSF).

Step 1: Create a new Snowflake Account

Create a new dedicated Snowflake account for Panther using the example template below. To minimize latency, your Panther deployment and Snowflake instance should reside in the same AWS region.
USE ROLE ORGADMIN;
CREATE ACCOUNT <YOUR_PANTHER_ACCOUNT_NAME>
ADMIN_NAME = <YOUR_ADMIN_NAME>
ADMIN_PASSWORD = '<YOUR ADMIN PASSWORD>' # we recommend at least 32 characters
EMAIL = '<your sfnowflake DBA email>'
MUST_CHANGE_PASSWORD = FALSE
EDITION = ENTERPRISE # BUSINESS_CRITICAL edition required for certain features
REGION = <your region, i.e. aws_us_west_2>
COMMENT = 'Panther Snowflake BYOSF Production Environment';

Step 2: Create a Panther Account Admin

Next, in the new account, create a Panther Account Administrator user and grant it administrative privileges using the following commands:
USE ROLE SECURITYADMIN;
CREATE USER IF NOT EXISTS pantheraccountadmin password='<panther_credential>';
GRANT ROLE SYSADMIN
TO USER pantheraccountadmin;
GRANT ROLE SECURITYADMIN
TO USER pantheraccountadmin;
GRANT ROLE ACCOUNTADMIN
TO USER pantheraccountadmin;
ALTER USER pantheraccountadmin SET DEFAULT_ROLE = SYSADMIN;
The Panther customer support team will provide you with a unique one-time credential over a secure channel to use for this account. Panther will regularly rotate this credential in the future, so you are advised to maintain a separate administrative user for your own administrative needs.
And you're done! Panther will automatically configure and maintain the account for you using our automated tooling. We'll manage integrations, databases, warehouses, and users and roles in the new account.

Using the Snowflake UI or SnowSQL with your Panther Snowflake Account

If you would like to access your Panther-managed Snowflake account outside of the Panther Console, such as through the Snowflake UI or SnowSQL, please contact your Panther representative and request a BI user for read-only access to your Snowflake account.
Alternatively, if you would like to create and maintain several users with read-only access to the Panther data lake tables, you can use the PANTHERACCOUNTADMIN user or another SECURITYADMIN enabled user on your Snowflake account to run the following commands:
USE ROLE SECURITYADMIN;
# If needed, create a new user
CREATE USER IF NOT EXISTS my_readonly_user
PASSWORD = '<INITIAL PASSWORD>'
MUST_CHANGE_PASSWORD = TRUE;
# Grant the PANTHER_READONLY_ROLE to the newly created user
GRANT ROLE PANTHER_READONLY_ROLE TO USER my_readonly_user;

Disabling and Reenabling the Panther Account Admin User (Optional)

Panther maintains the PANTHERACCOUNTADMIN user credentials in a secure location, and will rotate them at a regular cadence in addition to using the credentials to rotate RSA keys used for read-only and database management access.
You can choose to disable this user from within the account, however, we do not recommend doing this as it will prevent Panther from performing credential rotation:
USE ROLE SECURITYADMIN;
ALTER USER PANTHERACCOUNTADMIN SET DISABLED = TRUE
If a Panther upgrade requires privileged access, the user can then be temporarily re-enabled:
USE ROLE SECURITYADMIN;
ALTER USER PANTHERACCOUNTADMIN SET DISABLED = FALSE

Customer-managed Snowflake Integration

For customer-managed Snowflake connection options, see this page.