Q37
Do you have a current SOC 2 Type II report?
SOC 2 Type II: claimed_with_trust_page
Before you share customer data with Snowflake, your compliance team needs documented proof they can be trusted. ThirdProof investigated Snowflake across 27 intelligence sources — here's what we found.
✓ FedRAMP Status: Authorized (Moderate) — verified against marketplace.fedramp.gov
25 sources queried. 95% confidence. Every Snowflake investigation produces both a risk report and an auto-filled security questionnaire — no vendor follow-up required.
Get Snowflake's Full Report Free →Security Questionnaire — Auto-Filled
Auto-filled from public evidence • 33% complete
Q37
SOC 2 Type II: claimed_with_trust_page
Q38
Snowflake holds ISO 27001 certification as listed in their official compliance reference guide and confirmed by press release regarding ISO/IEC 27001:2013 certification.
Q41
Not found in FedRAMP marketplace
Q40
Snowflake requires a signed Business Associate Agreement (BAA) before PHI data can be stored, meeting HIPAA and HITRUST CSF regulatory requirements.
Q42
Snowflake offers a standard Data Processing Addendum (DPA) implementing Standard Contractual Clauses (SCCs) for GDPR compliance.
+ 5 more compliance questions answered in the full report
Every investigation produces a full PDF report plus the complete 133-question questionnaire, mapped to SOC 2, HIPAA, PCI DSS, SIG, and more.
Get Snowflake's Full Report Free →Verified against FedRAMP Marketplace API as of March 2026
Verified against the official FedRAMP Marketplace API as of March 2026.
Snowflake Government regions authorized at Moderate impact level.
High Risk
Vendor Risk Assessment
Based on data availability and source coverage
25
Sources Queried
24
Sources With Data
April 6, 2026
Last Assessed
AI-generated analysis for Snowflake
Snowflake (snowflake.com) is a major publicly traded cloud data platform vendor assessed at Tier 2 (High Risk), driven primarily by a confirmed and extensively documented security breach affecting customer data and an active body of related securities litigation. On the positive side, Snowflake presents several meaningful strengths as an enterprise infrastructure provider:
Independence Statement
All evidence underlying this assessment was independently sourced from external data providers and public registries without vendor participation or notification.
8 findings identified for Snowflake
Article from www.scworld.com: "Ticketmaster data obtained from Snowflake hack momentarily leaked | brief | SC Media"
Article from nationaltoday.com: "SNOW Investors Eligible to Lead Snowflake Fraud Lawsuit - NYC Today"
Article from finance.yahoo.com: "Snowflake Lawsuits Test Product Efficiency Story And Usage Based Revenue Model"
Article from Menafn: "SNOW Investors Have Opportunity To Lead Snowflake Inc. Securities Fraud Lawsuit With The Schall Law Firm"
Article from Menafn: "Snowflake Inc. Sued For Securities Law Violations - Contact The DJS Law Group To Discuss Your Rights - SNOW"
1 article(s) reference security or regulatory concerns for "Snowflake": "Overview of the Snowflake Breach: Threat Actor Offers Data of Cloud Company’s Cu..." (SOCRadar® Cyber Intelligence Inc.) https://news.google.com/rss/articles/CBMiakFVX3lxTE5PZmsxbUtSMVlSaHJ2S0tZNHlmUjRvSGV2bElxcWRSV0daRGgyU2xfb19iSEpuUUZqVnVvbEZyNlZ2cWN5Qk8wQkZ5dEtoY3NsNm94LTdScjlORGE4NV8wWFVLaldmM01tMnc?oc=5
The SSL certificate for snowflake.com expires in 29 days.
snowflake.com is missing 3 recommended security headers: Strict-Transport-Security, Content-Security-Policy, X-Frame-Options.
21 positive signals verified
Legal Entity Actively Registered
Business Registration →[Filtered] Recently Registered Entity
Business Registration →Low-Confidence Sanctions Matches Only
Sanctions & Watchlist Screening →Firmographic Data Available
Company Intelligence →11 Open Ports Detected
Infrastructure Exposure →Established Domain (30+ years)
Domain Registration →Clean domain reputation
Threat Intelligence →Tech Community Discussion: security incident
Tech Community Sentiment →Minimal Tech Community Discussion
Tech Community Sentiment →HTTP Security Grade: B
HTTP Security Scan →Certificate Data from TLS Handshake
Certificate Transparency →Web Presence: 1 Years
Web Archive History →Domain in 10 Threat Intelligence Pulses
Threat Intelligence (OTX) →Clean IP Reputation
IP Reputation →Clean Safe Browsing Status
Malware & Phishing Check →Clean Website Security Scan
Website Security Scan →Trust Page Found, No Certifications Detected
Trust & Compliance Page Scan →Subprocessor Page Found (Placeholder)
Supply Chain & Subprocessor Discovery →Not Found as FDIC-Insured Institution
FDIC Institution Check →No SEC Enforcement Filings Found
SEC Filing Search →SOC 2 Compliance Claimed on Trust Page
Certification Registry Verification →Steps to address findings for Snowflake
IMMEDIATE (within 7 days) — Enforce MFA on all Snowflake accounts: Log into your Snowflake Admin Console, navigate to Security > Authentication Policies, and confirm multi-factor authentication is mandatory for every user and service account. This directly addresses the attack vector exploited in the 2024 breach campaign.
IMMEDIATE (within 14 days) — Verify TLS certificate renewal: Confirm with your Snowflake account manager that the snowflake.com certificate (expiring ~May 5, 2026) is being renewed. Re-check status at [SSL/TLS analysis service](https://www.SSL/TLS analysis service.com/ssltest/analyze.html?d=snowflake.com) within two weeks.
SHORT-TERM (within 30 days) — Obtain SOC 2 Type II report: Request Snowflake's current SOC 2 Type II report directly from their security team or via [trust.snowflake.com](https://trust.snowflake.com/). Confirm the report covers the current period and request a bridge letter if the most recent report is older than 6 months. This is required to close the SOC 2 audit chain for your own CC9.2 compliance.
SHORT-TERM (within 30 days) — Obtain complete subprocessor list: Contact Snowflake's privacy team at the address listed in their DPA to request the current subprocessor list in writing. Reference your GDPR Article 28 rights if applicable. Document receipt and review the list for any subprocessors presenting their own risk concerns.
SHORT-TERM (within 30 days) — Review Snowflake access and audit logs: Examine query history, data export logs, and login events from your Snowflake environment for the June–September 2024 breach window. Use Snowflake's ACCOUNT_USAGE schema (LOGIN_HISTORY, QUERY_HISTORY, ACCESS_HISTORY views) to identify any anomalous access patterns.
MEDIUM-TERM (within 60 days) — Document complementary user entity controls (CUECs): If Snowflake is in scope for your SOC 2 audit boundary, document the controls your organization is responsible for implementing (e.g., access provisioning/deprovisioning, MFA enforcement, data classification, encryption key management). Share this documentation with your SOC 2 auditor as CC9.2 evidence alongside this report.
MEDIUM-TERM (within 60 days) — Clarify AI data handling practices: Submit a written inquiry to Snowflake's privacy team asking specifically: (1) Does Snowflake train AI/ML models on customer data? (2) What is the retention period for data processed by Snowflake AI features (Cortex, etc.)? (3) Is there an enterprise opt-out mechanism? Reference their [privacy policy](https://www.snowflake.com/en/legal/privacy/privacy-policy/) and request a written response for your records.
ONGOING — Monitor litigation developments: Set a Google Alert for 'Snowflake securities lawsuit' and 'Snowflake SNOW class action' to receive updates on the active securities fraud litigation. Reassess vendor risk tier if material adverse judgments or settlements are announced.
25 sources in this assessment
Some data sources may have had limited availability during this assessment. This does not reflect negatively on the vendor.
Are you Snowflake? Claim this profile to complete your security record. Buyers are reviewing this profile now.
Claim this profile →Is Snowflake on any OFAC, EU, or UN sanctions list? Are any officers or affiliates flagged?
What is Snowflake's security posture? Threat intelligence scanning, known vulnerabilities, and security header analysis.
Is Snowflake a legitimately registered business entity? Corporate status, jurisdiction, and officer verification.
Has Snowflake appeared in negative news coverage? Data breaches, lawsuits, regulatory actions, and complaints.
Is Snowflake's website secure? TLS configuration, DNS hygiene, security headers, and domain age analysis.
What are Snowflake's firmographics? Employee count, industry classification, technology stack, and corporate structure.
Does Snowflake claim SOC 2, ISO 27001, HITRUST, or FedRAMP? ThirdProof scans trust pages for certification claims and cross-references the FedRAMP public registry for independent verification.
Who does Snowflake depend on? ThirdProof discovers subprocessors from vendor-published pages and runs sanctions screening and safe browsing checks against each one.
Has Snowflake appeared in SEC enforcement filings? Is it associated with any FDIC bank failures? ThirdProof searches regulatory databases with entity verification to confirm attribution.
Full methodology, rule engine, and AI disclosure: /methodology
Seeing this in an audit? ThirdProof lets you investigate Snowflake and every other vendor in your stack — average report time: 7 minutes. Get Snowflake's Full Report Free →
SOC 2 CC9.2, HIPAA, PCI-DSS, and CMMC all require documented vendor due diligence — not just knowing the answer, but having audit-ready evidence you verified it. Most compliance teams can't produce that documentation on demand.
ThirdProof investigates Snowflake across 27 intelligence sources in an average of 7 minutes — sanctions screening, cyber posture, SOC 2 verification, FedRAMP status, and more. Every investigation produces two deliverables: an audit-ready risk report and an auto-filled security questionnaire your prospects and auditors expect to see.
Replaces $600–$900 in manual compliance consulting time per vendor assessed.