Skip to main content

โญ Repository โ†’ ๐Ÿ“ Compliance Engine โ†’ ๐Ÿ“ CloudAware โ†’ ๐Ÿ“ Snowflake โ†’ ๐Ÿ“ User

๐Ÿ›ก๏ธ Snowflake User Default Role is ACCOUNTADMIN๐ŸŸข

  • Contextual name: ๐Ÿ›ก๏ธ Default Role is ACCOUNTADMIN๐ŸŸข
  • ID: /ce/ca/snowflake/user/account-admin-default-role
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: SECURITY

Logicโ€‹

Descriptionโ€‹

Open File

Descriptionโ€‹

Ensure that the ACCOUNTADMIN role is not set as the default role for Snowflake Users.

Rationaleโ€‹

The ACCOUNTADMIN role grants full control over account parameters, billing data, user/role definitions, warehouses, and all metadata objects. Defaulting to this role for routine queries or development tasks exposes critical controls and sensitive information unnecessarily.

Forcing users to explicitly switch into ACCOUNTADMIN for high-impact tasks ensures that every use of the role is a deliberate action, improving incident investigations and reducing accidental misuse.

Snowflakeโ€™s RBAC model provides specialized system roles (e.g., SYSADMIN, SECURITYADMIN, USERADMIN) that should serve as default roles for administrators of specific functions.

Auditโ€‹

This policy marks a Snowflake User as INCOMPLIANT if Default Role Name field is set to ACCOUNTADMIN.

Remediationโ€‹

Open File

Remediationโ€‹

Using SQLโ€‹

The executing role must hold the OWNERSHIP privilege on the target user account to modify its properties via SQL.

Execute the following SQL command for each user found to have ACCOUNTADMIN as their default role:

ALTER USER {{username}}
SET DEFAULT_ROLE = {{non_accountadmin_role}};

Replace {{non_accountadmin_role}} with an appropriate, lower-privileged role that aligns with the userโ€™s operational needs (e.g., SYSADMIN, SECURITYADMIN, or a custom business role).

  • If the user legitimately requires elevated privileges, retain access to ACCOUNTADMIN, but require them to explicitly activate it via the USE ROLE ACCOUNTADMIN; command when necessary.

  • Revoke or reassign this role where it is no longer justified, following your organizationโ€™s access control and change management policies.

policy.yamlโ€‹

Open File

Linked Framework Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
๐Ÿ’ผ Cloudaware Framework โ†’ ๐Ÿ’ผ User Account Management17no data