Request edit access
Native Apps Security Questionnaire
Please ensure that Snowflake has access to any documents that are linked in your response
Sign in to Google to save your progress. Learn more
Email *
Snowflake contacts
Please provide the emails for any Snowflake employees you are working with
What is your organization's name? *
Application Overview
Please describe your application and its purpose
What is your application's name? *
What does your application do?
*
What are some of the use cases for the application?
*
Is your application ready to publish? *
Application Architecture
Please provide architecture documentation for your application. Please provide a relevant link for each of the following questions. 
Please read and ensure your application meets the security requirements for Native Applications
Following security best practices for Native Applications increase the chances of an application being approved. 
Please provide information about all components of your application. Including but not limited to:
All containers in the application *
All public endpoints exposed by the application
*
All external integrations (provider or 3P services)
*
Does your application use 0.0.0.0 for egress network rule/external access integration? *
If no please list all egress URLs used by your application
Does your application use any machine learning models not included in the application package? *
Does your application need to download code not included in the application package? *
All UDFs
*
Authentication/Authorization controls (if any)
*
Other security controls
Please provide a link to an architecture diagram showing information flow between all the components
*
Please provide information about data accessed/processed by your application
All consumer data accessed by the application
*
Does your application store any consumer data outside the consumer account? Including but not limited to:
* Any account access credentials
* Weights/models derived from consumer data
* Keys
* Logs etc.
*
If yes please list all the consumer data stored by the application outside the consumer account. 
*
Does your application access any data stored in provider account? *
All provider data accessed from the application that's not included in the app package
*
Security Assurance
Please describe in detail all security assurance activities.
Please select all applicable SDLC security activities followed during the development of your application
*
Required
Please select all applicable vulnerability management activities performed in your organization
*
Required
Do you have an incident response plan with published SLAs *
Please provide contact information that can be used to contact your organization in case of a security incident
*
Do you have a vendor security program? *
If yes, please provide details about your vendor security program
List all applicable certifications:
Images
Please answer the following questions regarding the images included in your application.
Does your application use minimal base images (chainguard, distroless, etc.)? *
Please provide the path for all custom code developed by you in the image *
Have the images in the application been scanned for CVEs? *
Do the images contain any critical or high severity CVEs? If yes, please provide an explanation for why your application is not impacted by the CVEs *
Have the images in the application been scanned for malware? *
Does the container in your application run with a non root user that has minimum privileges required for the application to function? *
Are image layers and command history available in the images? *
Application
Please provide additional information about the application and associated objects / permissions it requires. 
Please list all the objects created and permissions requested in a consumer account by your application *
Can any functionality in your application be accessed by a user without that user authenticating through Snowflake first? *
Submit
Clear form
Never submit passwords through Google Forms.
reCAPTCHA
This form was created inside of Snowflake Inc..

Does this form look suspicious? Report