In 2025, Snowflake security isnโt โa concernโ – itโs a mandate. After the 2024 breach exposed major customer data due to weak credential hygiene and lack of MFA, Snowflake is implementing progressive authentication improvements to enhance protections, and thereโs no opting out.
This is a fundamental shift. Single-factor authentication is being deprecated. Native passwords for service users? Gone. MFA for all human users? Mandatory.
If youโre running a data platform on Snowflake and youโre not planning for this rollout, youโll want to read on so you can catch up with these new updates. .
Whatโs Changing: Passwords Are Out, Strong Auth is In
Snowflake is deprecating single-factor password-based sign-ins across all human and service users. The transition is being rolled out via a series of Behavior Change Releases (BCRs). These arenโt optional. Once the bundles are enabled, the policies are enforced.
Note: this doesnโt apply to reader, trial, or Open Catalog accounts – but if youโre running production workloads or pipelines, youโre in scope, so prepare accordingly.
Whoโs Affected: Human vs. Service Users
Snowflake distinguishes users by the TYPE attribute:
- TYPE = PERSON: Human users (default if unset)
- TYPE = SERVICE: Programmatic/service users
- TYPE = LEGACY_SERVICE: Transitional user type (temporary use of passwords for services, being deprecated)
What this means:
- Human users will be forced into MFA when authenticating via password.
- Service users will be blocked from password-based login entirely. Only OAuth or key-pair auth will be allowed.
This change reflects a broader shift in the cloud security landscape. Credentials are the #1 attack vector in nearly every breach report published in the last five years. Snowflake is drawing a hard line to eliminate them.
Timeline: When the Changes Take Effect
For Human Users:
- May โ July 2025: Mandatory MFA for all Snowsight users (existing + new)
- Aug โ Oct 2025: MFA required for all newly created human users (not just Snowsight)
- Mar โ May 2026: Mandatory MFA for all human users, no exceptions
For Service Users:
- Nov 2025 โ Jan 2026: No new LEGACY_SERVICE users can be created
- June โ Aug 2026: All remaining LEGACY_SERVICE users blocked. Key-pair or OAuth required
These timelines are tied to Snowflakeโs monthly BCR bundle lifecycle. But donโt wait. You need to be proactive now to avoid outages, especially for automated pipelines and embedded workloads.
What You Should Be Doing (Now)
1. Set User Types
Use ALTER USER to explicitly define PERSON or SERVICE. Donโt rely on default behavior.
ALTER USER user1 SET TYPE = PERSON;
ALTER USER svc_user1 SET TYPE = SERVICE;
This step alone can prevent accidental policy enforcement on automation users and clarify future access methods.
2. Audit Your Risky Users
Use the Trust Center to run queries that identify accounts:
- With passwords
- Without MFA
- Using LEGACY_SERVICE
Extend this with queries for service users and distribution across authentication methods. Start categorizing:
- Who can be migrated?
- Whoโs blocked by legacy system limitations?
- Whoโs not in use anymore?
3. Migrate Service Accounts to Key-Pair or OAuth
OAuth is the preferred method for programmatic access due to its short-lived, scoped tokens. Key-pair auth is allowed but must be rotated regularly and combined with network controls.
CREATE AUTHENTICATION POLICY programmatic_auth
ย ย AUTHENTICATION_METHODS = ('OAUTH');
ALTER USER svc_user1 SET AUTHENTICATION POLICY = programmatic_auth;
Also enforce IP-based or VPCE-based network policies:
CREATE NETWORK POLICY secure_net_policy
ย ย ALLOWED_IP_LIST = ('10.0.0.0/8');
ALTER USER svc_user1 SET NETWORK_POLICY = secure_net_policy;
4. Enforce MFA Across the Board
You donโt need to wait for Snowflake to enforce MFA. Apply your own authentication policy now:
CREATE AUTHENTICATION POLICY require_mfa
ย ย MFA_AUTHENTICATION_METHODS = ('PASSWORD')
ย ย MFA_ENROLLMENT = REQUIRED;
ALTER ACCOUNT SET AUTHENTICATION POLICY = require_mfa;
This will override optional MFA for native users and lock down all TYPE = PERSON accounts that arenโt using SSO.
5. Apply Session + Network Policies
Enforce session timeouts and geofencing to reduce attack surface:
CREATE SESSION POLICY secure_session
ย ย SESSION_IDLE_TIMEOUT_MINS = 120
ย ย SESSION_UI_IDLE_TIMEOUT_MINS = 15;
ALTER ACCOUNT SET SESSION POLICY = secure_session;
How Yuki Streamlines Your Transition
At Yuki, weโre not just helping companies reduce Snowflake costs. Weโre helping them simplpify their Snowflake authentication migration process with powerful built-in tools:
Hereโs what that looks like in practice:
- Identify all users relying on password authentication and service accounts in need of migration
- Highlight legacy service users and help transition them to secure identities
- Audit MFA enablement and apply prebuilt authentication policies
- Monitor login history and Trust Center findings in one place
And we do it all inside your cloud. Your data never leaves your VPC. We operate as a zero-trust-aligned system that integrates seamlessly into your existing stack, completely automated with no weeks of dev work needed.
Need help preparing for this new security landscape? Our Snowflake experts can help.
Snowflakeโs Long-Term Security Vision: Federated Auth Everywhere
Snowflakeโs long-term direction is clear: adopt federated identity everywhere. In 2025 and beyond, Snowflake will:
- Support passkeys + authenticator apps (beyond DUO)
- Improve native OAuth support for connectors + drivers
- Enhance the Trust Center with org-wide insights, ML-based anomaly detection, and alerting
- Enable workload identity via cloud-native roles (e.g., AWS IAM, Azure Managed Identity)
- Expand mTLS support for secure bi-directional connections
These changes will reduce password reliance to near-zero. Snowflake wants to be passwordless by design – and we agree. This is the best way to guarantee complete data security for your Snowflake setup.
The Bigger Picture: Security, Not Just Compliance
Snowflakeโs security update isnโt just about checking a compliance box. Itโs about:
- Reducing your blast radius
- Preventing silent failures in ETL pipelines
- Maintaining availability during vendor outages
- Supporting zero-trust enterprise standards
A Snowflake security failure today is a data breach headline tomorrow. Youโre protecting:
- Customer data
- Financial insights
- Competitive models and IP
We canโt afford to take shortcuts.
Free Snowflake Security Update Checklist: Is Your Org Ready?
TASK | STATUS |
Define all users by TYPE (PERSON, SERVICE) | |
Audit for password-only users via Trust Center | |
Migrate all LEGACY_SERVICE users | |
Apply account-level MFA enforcement | |
Apply key-pair or OAuth auth for services | |
Apply session + network policies | |
Monitor with Trust Center weekly | |
Test for break-glass scenarios | |
Remove unused users and credentials |
TL;DR: Snowflake Is Moving. Are You?
Passwords are being deprecated.
MFA is mandatory.
Service users must migrate.
The timelines are already public. The bundles are already shipping. Your environment needs to move with them.
Yuki makes this easy, fast, and secure. If you want help auditing your Snowflake environment, enforcing MFA, migrating to key-pair or OAuth, and aligning with best practices – letโs talk.
Request your Snowflake security audit
Because in the end, better security isnโt just protection. Itโs prevention.