Snowflake provides multiple layers of protection for data, including:
Continuous data protection
High durability and high availability
End-to-end encryption
Fine-grained governance features
Zero-copy secure data sharing
These mechanisms ensure the platform is safe, resilient, compliant, and collaborative.
Snowflake provides two powerful mechanisms that allow data recovery even after accidental changes or deletion: Time Travel and Fail-safe.
Time Travel allows you to query, clone, or restore data as it existed at a specific point in the past.
Undo accidental DELETE, UPDATE, or DROP
Recover old versions of tables, schemas, or databases
Audit historical changes
Run analyses on historical states
Create point-in-time clones
Examples:
SELECT * FROM orders AT (TIMESTAMP => '2024-01-10 10:00:00');
UNDROP TABLE customers;
Depends on the edition:
Standard Edition → 1 day
Enterprise Edition → up to 90 days
Longer retention → more physical storage used for historical versions.
Snowflake automatically manages historical micro-partitions, but customers pay for extended retention.
Fail-safe is a 7-day recovery period after Time Travel expires.
Only Snowflake can access Fail-safe
Customers cannot query Fail-safe data
Used strictly for disaster recovery
Not a substitute for backup or Time Travel
You must know the difference:
Time Travel → user-accessible recovery
Fail-safe → Snowflake-only recovery for emergencies
Snowflake ensures that data is protected against hardware failures, availability zone outages, and regional disruptions.
Within an account’s region:
All data is automatically stored redundantly
Across multiple availability zones
With built-in fault tolerance
Users do not configure redundancy — Snowflake handles it.
For higher resilience:
Databases, shares, and account metadata can be replicated to:
Other regions
Other cloud providers (AWS ↔ Azure ↔ GCP)
Multi-region disaster recovery
Low-latency access for global teams
Business continuity planning
Cross-cloud flexibility
Snowflake supports:
Failover: switch to a replica during outage
Failback: return to primary after recovery
This is commonly tested on the exam.
Snowflake uses end-to-end encryption for all data at rest and in transit.
Data in micro-partitions is encrypted
Stage files are encrypted
Backups for Time Travel and Fail-safe are encrypted
Network traffic is encrypted with TLS
Users cannot disable encryption — it is always enabled.
Keys are organized in layers:
Account master key
Database keys
Table keys
Micro-partition (file) keys
Each level encrypts the level below it.
Strong compartmentalization
Regular automatic key rotation
Easy/manageable security lifecycle
Snowflake supports customer-managed keys via cloud KMS:
AWS KMS
Azure Key Vault
GCP KMS
This is used by organizations with strict compliance policies like:
Financial services
Healthcare
Government
Snowflake has advanced governance tools for fine-grained, policy-driven access control.
These features help with compliance: GDPR, HIPAA, PCI, etc.
Row Access Policies restrict which rows a user is allowed to see based on conditions.
Example:
Analysts only see rows from their assigned region
Managers can see all rows
Snowflake evaluates the policy automatically during queries.
Masking policies are applied to columns to:
Hide PII
Obfuscate sensitive values
Show different data depending on user role
Example:
Mask phone number except last four digits
Mask email username but show domain
Mask fully for non-privileged roles
Masking is applied at query time, dynamically.
Tags allow classification of objects and columns:
PII
Financial
Confidential
Regulatory categories
Tags can be tied to:
Masking policies
Governance rules
Data cataloging tools
This enables automated, scalable governance rules.
Secure views hide:
Underlying SQL logic
Column lineage
Table structures
Used to prevent users from inferring sensitive information.
Secure UDFs hide the implementation details of functions, preventing exposure of sensitive logic or data patterns.
Secure Data Sharing is one of Snowflake’s signature features.
It enables organizations to share live data safely and efficiently.
The provider:
Creates a share
Adds:
Databases
Schemas
Tables
Views
Secure views
Secure UDFs
Grants the share to a consumer account
The consumer:
Creates a database from the share
Queries shared objects as if they were local
No data movement required.
Data is not copied.
Consumers read from the provider’s storage.
Benefits:
No ETL
Real-time data sharing
Very cost-efficient
No synchronization issues
Consumers cannot mutate (INSERT/UPDATE/DELETE) shared objects.
Between business units:
Finance → Analytics
Marketing → Sales
Operational systems → BI
Share with:
Partners
Vendors
Customers
Useful for:
Data products
Operational collaboration
Supply chain visibility
On Snowflake Marketplace, providers can:
Sell data
Offer free public datasets
Publish data applications
Consumers subscribe with no physical data movement.
Snowgrid is Snowflake’s global metadata and orchestration layer that operates across all Snowflake-supported cloud regions and providers. It is the foundation that allows Snowflake to function as a unified multi-cloud platform rather than isolated deployments.
Snowgrid ensures that Snowflake behaves consistently across AWS, Azure, and GCP by coordinating metadata, governance, and replication operations.
Snowgrid enables:
Cross-region and cross-cloud replication
Coordinated failover and failback of replicated environments
Global secure data sharing
Marketplace product distribution across multiple regions
Because Snowgrid orchestrates replication and metadata operations, it ensures that:
Policies behave uniformly across regions
Privileges and roles are synchronized as required
Shared objects maintain consistent visibility and security properties
Snowgrid is essential for enterprise deployments that span geography or multiple cloud providers.
Replication ensures redundancy, disaster recovery readiness, and global availability of data.
Replicates both data and metadata for selected databases to another Snowflake region or cloud.
Supports:
Cross-region analytics
Disaster recovery
Low-latency access for distributed teams
Used specifically for cross-region secure data sharing.
Replicates the underlying share definitions and metadata so that consumers in other regions can access data.
An organization-level feature that replicates selected account-level objects, such as:
Databases
Shares
Users
Roles
Account metadata
Enables coordinated account-level failover.
Replication is asynchronous and follows Snowflake-managed schedules.
There is no guarantee of zero-lag replication, though delays are typically small.
Certain object types cannot be replicated, such as:
Temporary tables
Some transient objects
Certain non-durable metadata types
Understanding replication eligibility is important for DR planning.
Failover Groups simplify cross-region disaster recovery by grouping multiple objects under a single failover unit.
A Failover Group is a logical container that includes:
Databases
Secure shares
Roles and grants associated with those databases and shares
This group can be failed over as a single atomic unit.
Failover Groups support both:
Failover (switching active region)
Failback (returning to original region)
Snowgrid orchestrates replication and state transitions.
Executing a failover requires explicit privileges.
Failover cannot occur unless:
The role initiating the failover has been granted appropriate access
The failover group is fully synchronized
This prevents accidental DR events.
Reader Accounts are a central part of Snowflake’s data-sharing ecosystem, enabling providers to share data with consumers who do not operate Snowflake accounts.
The provider creates and fully manages the Reader Account.
Use cases include:
Sharing data with customers
Monetizing data products
Providing limited, controlled environments for external partners
The provider pays for all compute used by the Reader Account, including:
Query execution
Materialized view maintenance
Other Snowflake operations
This lowers friction for consumers, especially those who do not want to become Snowflake customers.
Reader Accounts are isolated from the provider’s environment and can only see explicitly shared objects.
Secure data sharing is powerful but has important constraints.
The following objects cannot be shared:
Temporary tables
Transient objects in certain scenarios
Non-secure UDFs
Internal stages
These limitations exist because shared objects must have durable metadata and predictable behavior.
Consumers cannot:
INSERT
UPDATE
DELETE
MERGE
on shared objects.
Sharing provides access to live data, but not the ability to mutate it.
Consumers cannot clone shared objects unless:
The provider enables replication, or
Special configurations are used for cross-region replication
Cross-region sharing implicitly uses replication behind the scenes.
Understanding how cloning interacts with Time Travel and Fail-safe is crucial for data protection planning.
Cloned objects inherit the Time Travel retention from the source object.
Retention does not reset during cloning.
Fail-safe is not extended or duplicated during cloning.
A clone does not receive additional Fail-safe windows beyond what the source object has already accumulated.
When a clone is dropped:
Historical micro-partitions referenced only by the clone may be removed
This can reduce Time Travel recoverability
Storage consumption may decrease
Retention planning must account for cloning lifecycle.
Customer-Managed Keys (CMK) extend Snowflake’s encryption model by giving customers control over master-level encryption keys.
CMK is implemented through cloud provider KMS services:
AWS KMS
Azure Key Vault
Google Cloud KMS
The customer manages the root key; Snowflake uses it to encrypt account-level data keys.
Customers may rotate CMKs manually according to security policy or compliance frameworks.
Snowflake automatically re-encrypts necessary metadata or keys as required.
Snowflake must have continuous access to the CMK.
If access is revoked:
Snowflake cannot decrypt data
Affected data becomes inaccessible until permissions are restored
This behavior is critical in regulated industries.
CMK is commonly used in:
Financial institutions
Government organizations
Healthcare environments
Any environment requiring customer-owned encryption keys
CMK ensures organizations maintain full control over their encryption lifecycle.
What is Time Travel in Snowflake?
Time Travel allows access to historical data by querying previous versions of tables within a retention period.
It enables recovery of deleted or modified data. The retention period varies by edition. A common mistake is assuming it provides permanent backup—it does not.
Demand Score: 84
Exam Relevance Score: 95
What is Fail-safe in Snowflake?
Fail-safe is a 7-day recovery period after Time Travel expires, used by Snowflake for disaster recovery.
It is not user-accessible and is intended for critical recovery scenarios. A common mistake is expecting direct query access during Fail-safe.
Demand Score: 82
Exam Relevance Score: 94
What is zero-copy cloning?
Zero-copy cloning creates a copy of a table or database without duplicating data, using shared micro-partitions.
It is fast and storage-efficient. Changes to clones create new partitions. A common mistake is assuming it duplicates storage immediately.
Demand Score: 83
Exam Relevance Score: 93
How does secure data sharing work in Snowflake?
Data is shared via Snowflake accounts without copying data, using secure views and metadata access.
Consumers query shared data in real-time. No data movement occurs. A common mistake is assuming data is physically replicated.
Demand Score: 80
Exam Relevance Score: 92
What is the difference between data sharing and data replication?
Data sharing provides live access without copying data, while replication creates copies across regions or accounts.
Sharing is real-time and cost-efficient, while replication supports disaster recovery. A common mistake is confusing the two concepts.
Demand Score: 81
Exam Relevance Score: 93