Skip to content

Getting Started with Redshift

The how-to guides linked on this page illustrate how to integrate Redshift with Immuta and gain value from the Immuta modules: Discover and Secure.

Requirement: Redshift cluster with an RA3 node is required for the multi-database integration. For other instance types, you may configure a single-database integration using one of the Redshift Spectrum options.

Configure your Redshift integration

Configuring a Redshift integration is required for Secure. These guides provide information on the recommended feature to enable with Redshift.

  1. Configure your Redshift integration or configure your Redshift Spectrum integration.

  2. Select None as your default subscription policy.

  3. Integrate an IAM with Immuta.

  4. Map external user IDs from Redshift to Immuta.

Discover your data

Private preview

Native SDD for Redshift is currently in private preview and available to all accounts. Please reach out to your Immuta representative to enable it on your tenant.

These guides provide step-by-step instructions for discovering, classifying, and tagging your data.

  1. Enable sensitive data discovery (SDD).
  2. Register a subset of your tables to configure and validate SDD.
  3. Configure SDD to discover entities of interest for your policy needs.
  4. Validate that the SDD tags are applied correctly.
  5. Register your remaining tables at the schema level with schema monitoring turned on.
  6. Implement classification to categorize and tag sensitive data.

Secure your data

These guides provide step-by-step instructions for configuring and securing your data with governance policies, or see the Secure use cases for a comprehensive guide on creating policies to fit your organization's use case.

  1. Create a global subscription policy.
  2. Create a global data policy.
  3. Validate the policies. You do not have to validate every policy you create in Immuta; instead, examine a few to validate the behavior you expect to see.
  4. Once all Immuta policies are in place, remove or alter old permissions and revoke access to the ungoverned tables.