Skip to content

Commit 79f5deb

Browse files
authored
format
1 parent fba1324 commit 79f5deb

1 file changed

Lines changed: 10 additions & 1 deletion

File tree

README.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ Last updated: 2025-05-03
2929
- [Infrastructure as Code IaC](#infrastructure-as-code-iac)
3030
- [Source Control Integration](#source-control-integration)
3131
- [Security](#security)
32+
- [Role Based Access Control](#role-based-access-control)
3233
- [Microsoft Purview for Fabric](#microsoft-purview-for-fabric)
3334
- [Networking](#networking)
3435
- [Monitoring and Observability](#monitoring-and-observability)
@@ -122,14 +123,22 @@ From [Microsoft Documentation](https://learn.microsoft.com/pt-br/fabric/fundamen
122123

123124
## Security
124125

125-
> Implementing robust security measures ensures that sensitive data is protected, access is controlled, and compliance requirements are met. Click to read more about [Security \& Governance](./Security/)
126+
> Implementing robust security measures ensures that sensitive data is protected, access is controlled, and compliance requirements are met.
126127
127128
| **Category** | **Description** |
128129
|--------------|-----------------|
129130
| **Identity & Access Management (IAM)** | - **RBAC:** Assign permissions based on user roles for simplified management. <br/> - **ABAC:** Implement dynamic, context-aware access based on attributes. <br/> - **RLS & CLS:** Apply row- and column-level security using dynamic filters and selective visibility. <br/> - **MFA, SSO & MSI:** Enhance authentication with multi-factor methods, streamline access via single sign-on, and utilize managed service identities to avoid hard-coded credentials. |
130131
| **Data Protection & Encryption** | - **Data Masking:** Hide sensitive information from unauthorized users. <br/> - **Audit Logs:** Keep detailed records to monitor user activities and detect anomalies. <br/> - **Encryption at Rest:** Use Azure Storage Service Encryption and Transparent Data Encryption (TDE) to protect stored data. <br/> - **Encryption in Transit:** Secure communications with TLS/SSL protocols and VPNs. |
131132
| **Networking & Granular Controls** | - **Granular Security Controls:** Implement layered security measures to comprehensively protect sensitive data. <br/> - **Networking:** Leverage Fabric’s unified platform to simplify secure network configurations. For more details, see [Networking](#networking) |
132133

134+
## Role Based Access Control
135+
136+
> Role-Based Access Control (RBAC)
137+
138+
- **Workspace Roles**: Define roles within the Fabric workspace to control access to resources.
139+
- **Object-Level Roles**: Implement roles at the object level to manage permissions for specific data objects. Click to read more about [Security \& Governance by Object Level](./Security/)
140+
- **Purview Integration**: Use Microsoft Purview to manage and enforce data governance policies.
141+
133142
## Microsoft Purview for Fabric
134143

135144
> **Microsoft Purview** is a unified data governance solution that helps `organizations manage and govern` their on-premises, multi-cloud, and software-as-a-service (SaaS) data. When integrated with **Microsoft Fabric**, Purview enhances `data discovery, classification, lineage, and access control` across the entire data estate. In the context of **Microsoft Fabric**, which is an end-to-end analytics platform that unifies data engineering, data science, real-time analytics, and business intelligence, Purview plays a crucial role in:

0 commit comments

Comments
 (0)