25 March 2025

🏭🗒️Microsoft Fabric: Security [Notes]

Disclaimer: This is work in progress intended to consolidate information from various sources for learning purposes. For the latest information please consult the documentation (see the links below)! 

Last updated: 25-Mar-2024

Microsoft Fabric Security
Microsoft Fabric Security [2]
[Microsoft Fabric] Security
  • {def} a comprehensive security framework designed for the Microsoft Fabric platform [1]
    • {goal} always on 
      • every interaction with Fabric is encrypted by default and authenticated using Microsoft Entra ID [1]
        • all communication between Fabric experiences travels through the Microsoft backbone internet [1]
        • data at rest is automatically stored encrypted [1]
        • support for extra security features [1]
          • ⇐ allow to regulate access to Fabric [1]
          • Private Links 
            • enable secure connectivity to Fabric by 
              • restricting access to the Fabric tenant from an Azure VPN
              • blocking all public access
            • ensures that only network traffic from that VNet is allowed to access Fabric features [1]
          • Entra Conditional Access 
        • the connection to data is protected by a firewall or a private network using trusted access [1]
          • access firewall enabled ADL Gen2 accounts securely [1]
            • can be limited to specific workspaces [1]
              • workspaces that have a workspace identity can securely access ADL Gen 2 accounts with public network access enabled, from selected virtual networks and IP addresses [1]
            • workspace identities can only be created in workspaces associated with a Fabric F SKU capacity [1]
        • helps users connect to services quickly and easily from any device and any network [1]
          • each request to connect to Fabric is authenticated with Microsoft Entra ID [1]
            • allows users to safely connect to Fabric from their corporate office, when working at home, or from a remote location [1]
        • {feature} Conditional Access
          • allows to secure access to Fabric on every connection by
            • defining a list of IPs for inbound connectivity to Fabric [1]
            • using MFA [1]
            • restricting traffic based on parameters such as country of origin or device type [1]
    • {goal} compliant
      • data sovereignty provided out-of-box with multi geo capacities [1]
      • support for a wide range of compliance standards [1]
      • Fabric services follow the SDL)
        • a set of strict security practices that support security assurance and compliance requirements [2]
        • helps developers build more secure software by reducing the number and severity of vulnerabilities in software, while reducing development cost [2]
    • {goal} governable
      • leverages a set of governance tools
        • data lineage
        • information protection labels
        • data loss prevention 
        • Purview integration 
    • configurable
      •  in accordance with organizational policies [1]
    • evolving 
      • new features and controls are added regularly [1]
  • {feature} managed private endpoints 
    • allow secure connections to data sources without exposing them to the public network or requiring complex network configurations [1]
      • e.g. as Azure SQL databases
  • {feature} managed virtual networks
    • virtual networks that are created and managed by Microsoft Fabric for each Fabric workspace [1]
    • provide network isolation for Fabric Spark workloads
      • the compute clusters are deployed in a dedicated network and are no longer part of the shared virtual network [1]
    • enable network security features
      • managed private endpoints
      • private link support
  • {feature} data gateway
    • allows to connect to on-premises data sources or a data source that might be protected by a firewall or a virtual network
    • {option} On-premises data gateway
      • acts as a bridge between on-premises data sources and Fabric 1[]
      • installed on a server within the network [1]
      • allows Fabric to connect to data sources through a secure channel without the need to open ports or make changes to the network [1]
    • {option} Virtual network (VNet) data gateway
      • allows to connect from Microsoft Cloud services to Azure data services within a VNet, without the need of an on-premises data gateway [1]
  • {feature} Azure service tags
    • allows to ingest data from data sources deployed in an Azure virtual network without the use of data gateways [1]
      • e.g. VMs, Azure SQL MI and REST APIs
    • can be used to get traffic from a virtual network or an Azure firewall
      • e.g. outbound traffic to Fabric so that a user on a VM can connect to Fabric SQL connection strings from SSMS, while blocked from accessing other public internet resources [1]
  • {feature} IP allow-lists
    • allows to enable an IP allow-list on organization's network to allow traffic to and from Fabric
    • useful for data sources that don't support service tags [1]
      • e.g. on-premises data sources
  • {feature} Telemetry
    • used to maintain performance and reliability of the Fabric platform [2]
    • the telemetry store is designed to be compliant with data and privacy regulations for customers in all regions where Fabric is available [2]
  • {process} authentication
    • relies on Microsoft Entra ID to authenticate users (or service principals) [2]
    • when authenticated, users receive access tokens from Microsoft Entra ID [2]
      • used to perform operations in the context of the user [2]
    • {feature} conditional access
      • ensures that tenants are secure by enforcing multifactor authentication [2]
        • allows only Microsoft Intune enrolled devices to access specific services [1] 
      • restricts user locations and IP ranges.
  • {process} authorization
    • all Fabric permissions are stored centrally by the metadata platform
      • Fabric services query the metadata platform on demand to retrieve authorization information and to authorize and validate user requests [2]
    • authorization information is sometimes encapsulated into signed tokens [2]
      • only issued by the back-end capacity platform [1]
      • include the access token, authorization information, and other metadata [1]
  • {concept} tenant metadata 
    • information about the tenant 
    • is stored in a metadata platform cluster to which the tenant is assigned
      • located in a single region that meets the data residency requirements of that region's geography [2]
      • include customer data 
      • customers can control where their workspaces are located
        • in the same geography as the metadata platform cluster
          • by explicitly assigning workspaces on capacities in that region [2]
          • by implicitly using Fabric Trial, Power BI Pro, or Power BI Premium Per User license mode [2]
            • all customer data is stored and processed in this single geography [2]
        • in Multi-Geo capacities located in geographies (geos) other than their home region [2]
          • compute and storage is located in the multi-geo region [2]
            • (including OneLake and experience-specific storage [2]
          • {exception} the tenant metadata remains in the home region
          • customer data will only be stored and processed in these two geographies [2]
  • {concept} data-at-rest
    • all Fabric data stores are encrypted at rest [2]
      • by using Microsoft-managed keys
      • includes customer data as well as system data and metadata [2]
      •  data is never persisted to permanent storage while in an unencrypted state [1]
        • data can be processed in memory in an unencrypted state [2]
    • {default} encrypted using platform managed keys (PMK)
      • Microsoft is responsible for all aspects of key management [2]
      • data-at-rest on OneLake is encrypted using its keys [3]
      • {alternative} Customer-managed keys (CMK) 
        • allow to encrypt data at-rest using customer keys [3]
          •   customer assumes full control of the key [3]
        • {recommendation} use cloud storage services with CMK encryption enabled and access data from Fabric using OneLake shortcuts [3]
          • data continues to reside on a cloud storage service or an external storage solution where encryption at rest using CMK is enabled [3]
          • customers can perform in-place read operations from Fabric whilst staying compliant [3] 
          • shortcuts can be accessed by other Fabric experiences [3]
  • {concept} data-in-transit
    • refers to traffic between Microsoft services routed over the Microsoft global network [2]
    • inbound communication
      • always encrypted with at least TLS 1.2. Fabric negotiates to TLS 1.3 whenever possible [2]
      • inbound protection
        •  concerned with how users sign in and have access to Fabric [3]
    • outbound communication to customer-owned infrastructure 
      • adheres to secure protocols [2]
        • {exception} might fall back to older, insecure protocols when newer protocols aren't supported [2]
          • incl. TLS 1
      • outbound protection
        • concerned with securely accessing data behind firewalls or private endpoints [3]


References:
[1] Microsoft Learn (2024) Security in Microsoft Fabric [link]
[2] Microsoft Learn (2024) Microsoft Fabric security fundamentals [link]
[3] Microsoft Learn (2024) Microsoft Fabric end-to-end security scenario [link]

Resources:
[R1] Microsoft Learn (2024) Microsoft Fabric security [link]
[R2] Microsoft Learn (2025) Fabric: What's new in Microsoft Fabric? [link]

Acronyms:
ADL - Azure Data Lake
API - Application Programming Interface
CMK - Customer-Managed Keys
MF - Microsoft Fabric
MFA - Multifactor Authentication 
MI - Managed Instance 
PMK - Platform-Managed Keys
REST - REpresentational State Transfer
SDL - Security Development Lifecycle
SKU - Stock Keeping Unit
TLS  - Transport Layer Security
VM - Virtual Machine
VNet - virtual network
VPN - Virtual Private Network

No comments:

Related Posts Plugin for WordPress, Blogger...

About Me

My photo
Koeln, NRW, Germany
IT Professional with more than 25 years experience in IT in the area of full life-cycle of Web/Desktop/Database Applications Development, Software Engineering, Consultancy, Data Management, Data Quality, Data Migrations, Reporting, ERP implementations & support, Team/Project/IT Management, etc.