We use cookies to give you a better online experience
Got it

Data Security with Multi-Layer Protection

Defense in Depth

Isolates and secures data assets with layered security controls.

Reduced Attack Surface

Minimizes attack surfaces, strengthening defenses.

Compliance Adherence

Meets industry standards like GDPR and SOC2 Type 2.

Advanced Network Security

Combine TLS encryption with customizable network policies for granular control, ensuring data is both encrypted and protected from unauthorized access.

CREATE NETWORK POLICY IF NOT EXISTS my_acme_np WITH
ALLOWED_IP_LIST = (‘44.224.89.1/24’)
BLOCKED_IP_LIST = (‘44.224.89.3’)
DESCRIPTION = ‘new network policy for my acme
organization’;
CREATE NETWORK POLICY IF NOT EXISTS kate_np WITH
ALLOWED_IP_LIST = (‘44.224.89.7’)
DESCRIPTION = ‘Kate’s network policy’;

Strengthened Access with Identity Management

Secure access to your resources with layered identity management, combining username and password authentication, Single Sign-On (SSO), and support for MFA. By integrating solutions like Auth0 and SAML 2.0, you can safeguard against unauthorized access.

ALTER ORGANIZATION vsko SET SSO = ‘{
 “signOnUrl”:  “https://acme-sso.okta.com/app/acme-sso-acmeappv2prod_1/exkelyi3do0l22FDA4x7/sso/saml”,
 “issuer”: “okta”,
 “provider”: “okta”,
 “Label”: “Okta Company App”,
 “fieldMapping”: {
     “given_name”: “name”,
     “family_name”: “surname”
  },
  “certificate”: “<certifate>”,
}‘
;

Single Sign-On

Firebolt supports Single Sign-On (SSO) for centralized access control, allowing users to authenticate across multiple apps with one set of credentials.

CREATE LOGIN "kate@acme.com" WITH
FIRST_NAME = 'Kate'
LAST_NAME = 'Peterson'
IS_PASSWORD_ENABLED = FALSE
IS_MFA_ENABLED = TRUE;

Multi-Factor Authentication (MFA)

Firebolt's MFA strengthens security by requiring multiple forms of verification for access. Admins can control MFA settings per login, ensuring compliance with industry regulations through centralized management with Okta and Auth0.

Granular Access Control

Get secure, role-based access with RBAC, which assigns permissions through hierarchical and composable roles. Strict authorization allows only permitted users to access critical data and system resources.

Securables and Permissions

Fine-grained access control with SQL-based permission management enables secure, flexible access across databases, engines, and queries.

CREATE ROLE IF NOT EXISTS sales;
GRANT USAGE ON DATABASE sales_db TO sales;  
GRANT USAGE ANY DATABASE ON ACCOUNT dev_account TO sales;
REVOKE OPERATE ON ENGINE sales_eng FROM sales;

Granular RBAC

Link users to logins for customizable access and role assignments, with flexible and out-of-the-box security options.

CREATE USER kate;
CREATE ROLE sales:
GRANT ROLE sales TO USER kate;  
GRANT SELECT ON TABLE sales_data to sales;
ALTER USER kate SET LOGIN = "kate@acme.com";

Layered Data Protection

Safeguard your data whether at rest and in motion through industry-standard encryption, secure key management, and TLS communication.

Industry Standards and Compliance

Get comprehensive information security aligned with industry best practices, ensuring privacy, confidentiality, integrity, and availability of data.

Dig Deeper

Whitepaper

Get all the key insights in our detailed report

Docs

Learn more about the service in our resources—your go-to for all the details.

See More

Pricing

Discover all the pricing details you need

See More

Get Started for Free

Power mixed workloads, from ELT to high-concurrency serving — all with SQL simplicity.

BEGIN NOW