Disclaimer: This is work in progress intended to consolidate information
from various sources for learning purposes. For the latest information
please consult the documentation (see the links below)!
Last updated: 25-Mar-2024
|
Microsoft Fabric Security [2]
|
[Microsoft Fabric] Security
-
{def} a comprehensive security framework designed for the Microsoft
Fabric platform [1]
- {goal} always on
-
every interaction with Fabric is encrypted by default and
authenticated using Microsoft Entra ID [1]
-
all communication between Fabric experiences travels through the
Microsoft backbone internet [1]
- data at rest is automatically stored encrypted [1]
- support for extra security features [1]
- ⇐ allow to regulate access to Fabric [1]
- Private Links
- enable secure connectivity to Fabric by
-
restricting access to the Fabric tenant from an Azure VPN
- blocking all public access
-
ensures that only network traffic from that VNet is allowed to
access Fabric features [1]
- Entra Conditional Access
-
the connection to data is protected by a firewall or a private
network using trusted access [1]
- access firewall enabled ADL Gen2 accounts securely [1]
- can be limited to specific workspaces [1]
-
workspaces that have a workspace identity can securely
access ADL Gen 2 accounts with public network access
enabled, from selected virtual networks and IP addresses [1]
-
workspace identities can only be created in workspaces
associated with a Fabric F SKU capacity [1]
-
helps users connect to services quickly and easily from any device
and any network [1]
-
each request to connect to Fabric is authenticated with
Microsoft Entra ID [1]
-
allows users to safely connect to Fabric from their corporate
office, when working at home, or from a remote location [1]
- {feature} Conditional Access
- allows to secure access to Fabric on every connection by
-
defining a list of IPs for inbound connectivity to Fabric [1]
- using MFA [1]
-
restricting traffic based on parameters such as country of
origin or device type [1]
- {goal} compliant
-
data sovereignty provided out-of-box with multi geo capacities [1]
- support for a wide range of compliance standards [1]
- Fabric services follow the SDL)
-
a set of strict security practices that support security assurance
and compliance requirements [2]
-
helps developers build more secure software by reducing the number
and severity of vulnerabilities in software, while reducing
development cost [2]
- {goal} governable
- leverages a set of governance tools
- data lineage
- information protection labels
- data loss prevention
- Purview integration
- configurable
- in accordance with organizational policies [1]
- evolving
- new features and controls are added regularly [1]
- {feature} managed private endpoints
-
allow secure connections to data sources without exposing them to the
public network or requiring complex network configurations [1]
- e.g. as Azure SQL databases
- {feature} managed virtual networks
-
virtual networks that are created and managed by Microsoft Fabric for
each Fabric workspace [1]
- provide network isolation for Fabric Spark workloads
-
the compute clusters are deployed in a dedicated network and are no
longer part of the shared virtual network [1]
- enable network security features
- managed private endpoints
- private link support
- {feature} data gateway
-
allows to connect to on-premises data sources or a data source that
might be protected by a firewall or a virtual network
- {option} On-premises data gateway
-
acts as a bridge between on-premises data sources and Fabric 1[]
- installed on a server within the network [1]
-
allows Fabric to connect to data sources through a secure channel
without the need to open ports or make changes to the network [1]
- {option} Virtual network (VNet) data gateway
-
allows to connect from Microsoft Cloud services to Azure data
services within a VNet, without the need of an on-premises data
gateway [1]
- {feature} Azure service tags
-
allows to ingest data from data sources deployed in an Azure virtual
network without the use of data gateways [1]
- e.g. VMs, Azure SQL MI and REST APIs
-
can be used to get traffic from a virtual network or an Azure firewall
-
e.g. outbound traffic to Fabric so that a user on a VM can connect
to Fabric SQL connection strings from SSMS, while blocked from
accessing other public internet resources [1]
- {feature} IP allow-lists
-
allows to enable an IP allow-list on organization's network to allow
traffic to and from Fabric
- useful for data sources that don't support service tags [1]
- e.g. on-premises data sources
- {feature} Telemetry
-
used to maintain performance and reliability of the Fabric platform
[2]
-
the telemetry store is designed to be compliant with data and privacy
regulations for customers in all regions where Fabric is available [2]
- {process} authentication
-
relies on Microsoft Entra ID to authenticate users (or service
principals) [2]
-
when authenticated, users receive access tokens from Microsoft Entra
ID [2]
- used to perform operations in the context of the user [2]
- {feature} conditional access
-
ensures that tenants are secure by enforcing multifactor
authentication [2]
-
allows only Microsoft Intune enrolled devices to access specific
services [1]
- restricts user locations and IP ranges.
- {process} authorization
-
all Fabric permissions are stored centrally by the metadata platform
-
Fabric services query the metadata platform on demand to retrieve
authorization information and to authorize and validate user
requests [2]
-
authorization information is sometimes encapsulated into signed tokens
[2]
- only issued by the back-end capacity platform [1]
-
include the access token, authorization information, and other
metadata [1]
- {concept} tenant metadata
- information about the tenant
-
is stored in a metadata platform cluster to which the tenant is
assigned
-
located in a single region that meets the data residency
requirements of that region's geography [2]
- include customer data
- customers can control where their workspaces are located
- in the same geography as the metadata platform cluster
-
by explicitly assigning workspaces on capacities in that region
[2]
-
by implicitly using Fabric Trial, Power BI Pro, or Power BI
Premium Per User license mode [2]
-
all customer data is stored and processed in this single
geography [2]
-
in Multi-Geo capacities located in geographies (geos) other than
their home region [2]
-
compute and storage is located in the multi-geo region [2]
- (including OneLake and experience-specific storage [2]
-
{exception} the tenant metadata remains in the home region
-
customer data will only be stored and processed in these two
geographies [2]
- {concept} data-at-rest
- all Fabric data stores are encrypted at rest [2]
- by using Microsoft-managed keys
-
includes customer data as well as system data and metadata [2]
-
⇒ data is never persisted to permanent storage while in
an unencrypted state [1]
- data can be processed in memory in an unencrypted state [2]
- {default} encrypted using platform managed keys (PMK)
-
Microsoft is responsible for all aspects of key management [2]
- data-at-rest on OneLake is encrypted using its keys [3]
- {alternative} Customer-managed keys (CMK)
- allow to encrypt data at-rest using customer keys [3]
-
⇒ customer assumes full control of the key [3]
-
{recommendation} use cloud storage services with CMK
encryption enabled and access data from Fabric using OneLake
shortcuts [3]
-
data continues to reside on a cloud storage service or an
external storage solution where encryption at rest using CMK is
enabled [3]
-
customers can perform in-place read operations from Fabric
whilst staying compliant [3]
- shortcuts can be accessed by other Fabric experiences [3]
- {concept} data-in-transit
-
refers to traffic between Microsoft services routed over the Microsoft
global network [2]
- inbound communication
-
always encrypted with at least TLS 1.2. Fabric negotiates to TLS 1.3
whenever possible [2]
- inbound protection
-
concerned with how users sign in and have access to Fabric
[3]
- outbound communication to customer-owned infrastructure
- adheres to secure protocols [2]
-
{exception} might fall back to older, insecure protocols when
newer protocols aren't supported [2]
- outbound protection
-
concerned with securely accessing data behind firewalls or private
endpoints [3]
References:
[1] Microsoft Learn (2024) Security in Microsoft Fabric [
link]
[2] Microsoft Learn (2024) Microsoft Fabric security fundamentals [
link]
[3] Microsoft Learn (2024) Microsoft Fabric end-to-end security scenario [
link]
Resources:
[R1] Microsoft Learn (2024) Microsoft Fabric security [
link]
[R2] Microsoft Learn (2025) Fabric: What's new in Microsoft Fabric? [
link]
Acronyms:
ADL - Azure Data Lake
API - Application Programming Interface
CMK -
Customer-Managed Keys
MF - Microsoft Fabric
MFA - Multifactor Authentication
MI -
Managed Instance
PMK - Platform-Managed Keys
REST - REpresentational State Transfer
SDL - Security Development
Lifecycle
SKU - Stock Keeping Unit
TLS - Transport Layer Security
VM - Virtual Machine
VNet - virtual network
VPN - Virtual Private Network