You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+10-1Lines changed: 10 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,6 +29,7 @@ Last updated: 2025-05-03
29
29
-[Infrastructure as Code IaC](#infrastructure-as-code-iac)
30
30
-[Source Control Integration](#source-control-integration)
31
31
-[Security](#security)
32
+
-[Role Based Access Control](#role-based-access-control)
32
33
-[Microsoft Purview for Fabric](#microsoft-purview-for-fabric)
33
34
-[Networking](#networking)
34
35
-[Monitoring and Observability](#monitoring-and-observability)
@@ -122,14 +123,22 @@ From [Microsoft Documentation](https://learn.microsoft.com/pt-br/fabric/fundamen
122
123
123
124
## Security
124
125
125
-
> Implementing robust security measures ensures that sensitive data is protected, access is controlled, and compliance requirements are met. Click to read more about [Security \& Governance](./Security/)
126
+
> Implementing robust security measures ensures that sensitive data is protected, access is controlled, and compliance requirements are met.
126
127
127
128
|**Category**|**Description**|
128
129
|--------------|-----------------|
129
130
|**Identity & Access Management (IAM)**| - **RBAC:** Assign permissions based on user roles for simplified management. <br/> - **ABAC:** Implement dynamic, context-aware access based on attributes. <br/> - **RLS & CLS:** Apply row- and column-level security using dynamic filters and selective visibility. <br/> - **MFA, SSO & MSI:** Enhance authentication with multi-factor methods, streamline access via single sign-on, and utilize managed service identities to avoid hard-coded credentials. |
130
131
|**Data Protection & Encryption**| - **Data Masking:** Hide sensitive information from unauthorized users. <br/> - **Audit Logs:** Keep detailed records to monitor user activities and detect anomalies. <br/> - **Encryption at Rest:** Use Azure Storage Service Encryption and Transparent Data Encryption (TDE) to protect stored data. <br/> - **Encryption in Transit:** Secure communications with TLS/SSL protocols and VPNs. |
131
132
|**Networking & Granular Controls**| - **Granular Security Controls:** Implement layered security measures to comprehensively protect sensitive data. <br/> - **Networking:** Leverage Fabric’s unified platform to simplify secure network configurations. For more details, see [Networking](#networking)|
132
133
134
+
## Role Based Access Control
135
+
136
+
> Role-Based Access Control (RBAC)
137
+
138
+
-**Workspace Roles**: Define roles within the Fabric workspace to control access to resources.
139
+
-**Object-Level Roles**: Implement roles at the object level to manage permissions for specific data objects. Click to read more about [Security \& Governance by Object Level](./Security/)
140
+
-**Purview Integration**: Use Microsoft Purview to manage and enforce data governance policies.
141
+
133
142
## Microsoft Purview for Fabric
134
143
135
144
> **Microsoft Purview** is a unified data governance solution that helps `organizations manage and govern` their on-premises, multi-cloud, and software-as-a-service (SaaS) data. When integrated with **Microsoft Fabric**, Purview enhances `data discovery, classification, lineage, and access control` across the entire data estate. In the context of **Microsoft Fabric**, which is an end-to-end analytics platform that unifies data engineering, data science, real-time analytics, and business intelligence, Purview plays a crucial role in:
0 commit comments