Snow falls over a terabyte of contracts. Your system has them all. Names, signatures, account numbers—every byte a liability if left exposed. Ramp’s contracts in Snowflake need more than storage; they need masking that works without slowing down the query engine.
Snowflake Data Masking lets teams control who can see sensitive fields while keeping the rest of the dataset usable. It’s not encryption; it’s precision access control at the column level. Dynamic Data Masking applies rules in real time. Masking policies define what shows for each role. The same query can return the real value to an authorized analyst and a masked value to everyone else.
Ramp contracts contain personal information, payment terms, and internal IDs. Sensitive fields—such as SSNs, bank account numbers, or customer names—are prime targets for masking. Using Snowflake’s CREATE MASKING POLICY command, you build rules that tie into role-based access. For example:
CREATE MASKING POLICY ssn_mask AS (val STRING) RETURNS STRING ->
CASE
WHEN CURRENT_ROLE() IN ('FULL_ACCESS_ROLE') THEN val
ELSE 'XXX-XX-XXXX'
END;
Attach policies directly to the columns in the contracts table.