ThoughtSpot Data Security Field Guide

ThoughtSpot Data Security Field Guide

rate limit

Code not recognized.

About this course

It is very easy to load data into ThoughtSpot or, in the case of Embrace/TSCloud, make the data available in ThoughtSpot, but it is also important to secure your data and ThoughtSpot provides many features to do this. We have developed a field guide with best practices and many scenarios around the topic of data security including:

  • ThoughtSpot Security Mechanisms
    • Authentication
    • Privileges
    • Content/Object Level Security
  • Best Practices for:
    • Security General
    • User and User Group Management
    • Row Level Security
    • Column Level Security
    • Data Masking
    • Orgs
    • Single/Multi-Tenancy
  • Various comprehensive security scenarios and how to implement them
    • Basic RLS implementation
    • Securing a single dimension
    • Securing multiple dimensions
    • Using Mapping/RLS/Security tables
    • Using RLS for granular vs aggregated access
    • Column Level Security
    • Data Masking
    • Using Pass Through Security with Snowflake
    • Orgs

About this course

It is very easy to load data into ThoughtSpot or, in the case of Embrace/TSCloud, make the data available in ThoughtSpot, but it is also important to secure your data and ThoughtSpot provides many features to do this. We have developed a field guide with best practices and many scenarios around the topic of data security including:

  • ThoughtSpot Security Mechanisms
    • Authentication
    • Privileges
    • Content/Object Level Security
  • Best Practices for:
    • Security General
    • User and User Group Management
    • Row Level Security
    • Column Level Security
    • Data Masking
    • Orgs
    • Single/Multi-Tenancy
  • Various comprehensive security scenarios and how to implement them
    • Basic RLS implementation
    • Securing a single dimension
    • Securing multiple dimensions
    • Using Mapping/RLS/Security tables
    • Using RLS for granular vs aggregated access
    • Column Level Security
    • Data Masking
    • Using Pass Through Security with Snowflake
    • Orgs