The Snowflake Tenant Cascade — A Lesson in Shared-Tenancy Architecture

The 2024 Snowflake tenant compromise demonstrates that modern data warehousing architecture, as currently deployed at scale, has sacrificed isolation for operational convenience—and the bill is paid not by the vendor, but by every customer simultaneously.

In early 2024, Snowflake disclosed that multiple customer accounts had been accessed without authorisation via stolen credentials, initially attributed to credential stuffing and account takeover (ATO) leveraging credentials stolen from third-party sources. Within weeks, the scope became clear: at least ten named customers, including US healthcare providers, payment processors, and logistics firms, discovered that attackers had accessed sensitive data spanning customer PII, payment card details, and operational intelligence. The attack vector was not exotic—attackers harvested credentials from prior breaches (Okta, 3CX, other SaaS supply chains), performed ATO against Snowflake accounts lacking multi-factor authentication (MFA), and then moved laterally within the shared cloud infrastructure to exfiltrate data from competitor tenant environments.

What distinguished the Snowflake incident from routine credential compromise was the architectural failure that enabled cascade: once a single tenant was compromised, the attacker's position within Snowflake's shared AWS infrastructure—with access to cloud storage buckets, compute nodes, and query logs—gave them visibility and lateral movement potential across other tenants' data. Snowflake's own investigation later acknowledged configuration gaps in tenant isolation and insufficient logging of cross-tenant data access patterns. Regulatory bodies moved quickly: the SEC's Office of Compliance Inspections and Examinations (OCIE) issued guidance to financial institutions on SaaS vendor risk; the UK FCA referred to Snowflake by name in its post-incident review of data protection controls; NYDFS (New York Department of Financial Services) Part 500 compliance filings from affected financial services firms listed Snowflake as a material cybersecurity event.

This was not the first cascade failure in cloud-native shared infrastructure. The MOVEit zero-day vulnerability (CVE-2023-34362) in 2023 affected thousands of organisations across a single codebase shared via SaaS. The Synnovis ransomware attack (2024) on NHS trusts exposed the risks of centralised laboratory reporting systems. Yet unlike MOVEit (which required patching) or Synnovis (which was ransomware targeting a single logical system), Snowflake's failure was purely architectural: the infrastructure was never compromised; customers' credentials were. But the shared-tenancy model ensured that compromise of one tenant's credentials meant potential visibility into others.

Why Industry Responses Deepen the Problem

The industry's standard remediation—across vendor guidance, regulatory bodies, and peer-led forums—has been remarkably consistent and remarkably surface-level. Vendors recommend MFA, API key rotation, network segmentation via IP whitelisting, and enhanced logging. Regulators mandate incident disclosure timelines, vendor risk assessments, and contractual SLAs for encryption at rest. Auditors tick the NIST Cybersecurity Framework (CSF) boxes: identify, protect, detect, respond. These controls are not wrong; they are necessary. But they treat the symptom, not the disease.

The disease is architectural: shared-tenancy SaaS platforms, by design, concentrate customer data in a single logical namespace, governed by a single set of control planes, accessed via a single authentication substrate. When credentials to that namespace are compromised, the attacker gains a foothold in an environment where other tenants' data is visible, queryable, and often unencrypted at the application layer. MFA does not change this. Network segmentation does not change this. Better logging does not change this. They merely make the attack slightly harder to execute and slightly easier to detect post-facto.

The Change Healthcare attack (2024), attributed to the LockBit ransomware gang, followed a different vector but exposed the same vulnerability: once an attacker gained initial access to a large centralised SaaS platform handling healthcare transactions, the critical systems (clearinghouse logic, claim routing, patient data aggregation) were all co-located. The attacker did not need to pivot across multiple customers' discrete systems; they were already in the shared infrastructure. The subsequent ransom demand—reported at £66 million—was rational precisely because of the architecture: a single extortion point controlling the claims-processing pipeline for thousands of providers.

Similarly, the 2024 M&S (Marks & Spencer) incident, attributed to the Scattered Spider threat group, revealed a pattern: attackers compromised a single privileged account (via social engineering and credential compromise), and from that point forward could traverse internal systems without further authentication friction. The company later disclosed that the attacker had access to sensitive operational data, customer records, and payment systems. Detection of the incident came only after significant dwell time—weeks of lateral movement before discovery.

Each of these incidents provoked the same regulatory playbook: incident disclosure (SEC 4-day rule, UK ICO breaches, Australian OAIC), vendor risk assessments, third-party audit mandates, and contractual indemnification clauses. But none of these responses address the root cause: the customer's data exists in a shared, multi-tenant namespace where isolation is enforced by logic, not by architecture.

The Structural Failure Mode

The PULSE doctrine names this the authentication-to-authority coupling failure. In traditional architecture, authentication (proving you are who you claim) is strictly decoupled from authority (access to data). A SIEM detects logins, an EDR watches endpoint behaviour, a DLP inspects outbound data flows. These are all detection systems, and they assume the infrastructure beneath them is trustworthy. They are not—and cannot be—defensive.

Shared-tenancy SaaS platforms collapse this decoupling. Authentication is authority. Once you authenticate to Snowflake, Okta, Datadog, or Slack as a tenant administrator, you inherit the entire surface of your tenant's stored data. No further authorisation is enforced. The control plane (authentication, session management, audit logging) is shared across all tenants. The data plane (the actual customer data, compute, storage) is nominally isolated via SQL row-level security (RLS), bucket policies, and role-based access control (RBAC), but these are application-layer enforcements, not infrastructure-layer isolation.

The attacker's rational behaviour in each case—Snowflake, Change Healthcare, M&S—was to assume this coupling. Compromise credentials, gain entry to the shared control plane, and then enumerate the data plane. The vendor's SIEM and EDR tools logged the activity; they always do. But logging is not prevention. Detection is not immunity.

The industry's response—mandating vendors implement "enhanced monitoring", "anomaly detection", and "threat intelligence integration"—deepens the problem by creating the illusion of control whilst leaving the architecture intact. NIST CSF compliance, ISO 27001 certification, and FCA SM&CR attestations all assume that properly monitored systems are properly defended systems. The Snowflake incident proved they are not. Organisations with CISOs trained on NIST CSF, audited annually, and contractually bound to vendor SLAs still lost control of their customer PII.

Architectural Principles Under PULSE Doctrine

A post-breach resistant architecture does not begin with detection; it begins with isolation by design. Three principles follow:

Zero-Knowledge Substrate

Customer data must be cryptographically isolated at the data plane, not merely at the application layer. In the PULSE model, a Snowflake-equivalent would cryptographically bind each customer's data to a unique key derived from that customer's identity, not from a shared warehouse master key. A query executed by a customer administrator would return only data that could be decrypted by their key material—not because the SQL WHERE clause was correct, but because the underlying data blocks are unintelligible without the correct derivation.

This is not full homomorphic encryption (which is computationally prohibitive at scale). It is domain-specific encryption: the system is engineered for a specific workload (analytical queries over encrypted data) and the encryption is embedded in the data plane, not bolted on via FIPS 140-2 key vaults. If an attacker compromises the control plane and executes the same query, the result is either encrypted garbage or an authentication failure at the cryptographic layer—not a data breach.

Control-Plane and Data-Plane Separation

The authentication substrate (Okta, Entra, custom) must be divorced from the query execution engine. A compromised Snowflake session should not automatically confer query authority. The authentication token grants a logical session; a second authorisation step—invisible to the user but critical to the architecture—verifies that the request is consistent with the customer's cryptographic posture. If an attacker's lateral movement attempt crosses a tenant boundary, the cryptographic binding breaks.

Continuous Adversarial Posture Drift

Unlike SIEM/SOAR platforms that respond to known attack signatures (Snort rules, Sigma detection logic, YARA patterns), a post-breach resistant system must assume the attacker has already moved laterally and must continuously adjust the control plane to raise the cost of persistence. Credential rotation is not a manual annual event or response to a detected breach; it is a continuous background process, with customer-transparent re-keying of the authentication substrate. Session tokens have sub-second lifespans. Encryption keys are derived from multi-factor secrets and are never stored in shared key management systems.

This is antithetical to vendor-managed SaaS operations. It requires the customer to retain cryptographic control. It is also architecturally feasible: domain-specific systems (encrypted analytical databases, zero-knowledge proof-based authentication, attribute-based encryption) have been built and deployed at scale. They are simply not built into commercially available multi-tenant SaaS platforms, because doing so would require customers to manage key material, and that is operationally inconvenient for vendors.

The Regulatory Reckoning

The UK's forthcoming Operational Resilience regime (PRA/FCA joint framework, implemented December 2024) explicitly requires financial services firms to understand the failure modes of third-party vendors and to design their own infrastructure with redundancy and isolation in mind. The NIS2 Directive (EU, implemented October 2024) mandates that essential services operators implement supply-chain security measures and understand the cascading failure risks of centralised SaaS dependencies. DORA (Digital Operational Resilience Act, EU, December 2024) goes further: financial institutions must conduct third-party operational risk assessments and stress-test failure scenarios.

These regimes assume the customer has the right to architect resilience, not merely to audit the vendor's controls. APRA CPS 234 (Australia) and NYDFS Part 500 (New York) include nearly identical provisions. The unspoken premise is that shared-tenancy SaaS, as currently designed, cannot meet these requirements.

The Snowflake cascade will likely be the first of several regulatory enforcement actions against SaaS vendors for architectural failures, not merely operational lapses. The SEC's Office of Compliance Inspections and Examinations has already begun examining financial services firms' vendor risk assessments; it is a matter of time before OCIE begins examining vendors themselves for material control deficiencies in shared-tenancy platforms.

The Path Forward

Organisations handling regulated data—financial transactions, healthcare records, payment card information—must begin designing data infrastructure that assumes shared-tenancy SaaS is unsuitable for sensitive workloads. This does not mean wholesale abandonment of cloud computing. It means:

This is operationally complex. It requires expertise in cryptographic systems, infrastructure automation, and adversarial modelling. It is also increasingly mandatory, not optional.

---

Closing

Organisations managing critical data should request a confidential briefing from PULSE on architecting post-breach resistant infrastructure under current regulatory constraints—executed under mutual NDA only.

Engagement

Request a briefing under executed Mutual NDA.

PULSE engages only with verified counterparties. Strategic briefing material — reference architecture, regulatory mapping, deployment topology — is released after counter-execution of the NDA scoped to the recipient's evaluation purpose.

Request Briefing →

Related Reading