Big Data, Cloud Computing

3 Mins Read

How to Secure Microsoft Fabric Data Warehouse?

In this article, we will discuss how to secure your fabric data warehouse. Warehouse access and user permissions are controlled by a combination of granular SQL permissions and Microsoft Fabric permissions once linked. At the very least, you should have authorization to read Microsoft Fabric, which is necessary for warehouse connectivity. You can grant permissions for each Warehouse within a workspace to utilize Microsoft Fabric. It’s feasible to provide SQL permissions to a user via Microsoft Fabric item permissions, thus removing the need to grant access within SQL directly.

Workspace Role

Within a fabric workspace, workspace roles are used to facilitate cooperation among development teams. The user’s actions are determined by their assigned role, which applies to every object in the workspace.

Workspace roles offer the following functionalities to each Warehouse and SQL analytics endpoint in the workspace:

  1. The Admin Role gives the user full read/write capabilities as well as the capacity to control specific user SQL permissions. Additionally, it Allows the user to see workspace-scoped sessions and monitor connections and requests in DMVs via TSQL and KILL sessions.
  2. Member Role gives the user full read/write capabilities as well as the capacity to control specific user SQL permissions.
  3. The contributor role enables the user to configure granular user SQL rights and receive complete read/write permissions.
  4. Viewer roll enables read-only and connects user access to all Warehouse and SQL analytics endpoints in the workspace.

Customized Cloud Solutions to Drive your Business Success

  • Cloud Migration
  • Devops
  • AIML & IoT
Know More

Item Permission:

Item rights can be explicitly granted to specific Warehouses, as opposed to workspace roles, which apply to every item inside a workspace. The user will be granted access to that particular Warehouse. Enabling sharing for the Warehouse’s downstream consumption is the main goal of these rights.

SQL Granular Control:

A user can be easily granted granular access to the entire Warehouse with the help of workspace roles and item permissions. Nonetheless, there are situations when a user needs more specific access. Standard T-SQL constructs can be used to grant users specific permissions to accomplish this. For SQL analytics endpoint and Warehouse:

  • Security can be managed using GRANT, REVOKE, and DENY T-SQL syntax at the object level.
  • SQL roles, including both custom and pre-defined database roles, can be assigned to users.
  • User can view their permission using the sys.fn_my_permissions function.

• Database scoped permissions:

SELECT * FROM sys.fn_my_permissions(NULL, 'Database');

• Schema scoped permissions:
SELECT * FROM sys.fn_my_permissions('', 'Schema');
Schema scoped permissions:

SELECT * FROM sys.fn_my_permissions('.', 'Object');


Best practice to prevent unauthorized viewing of data:

Role-Based Access Control (RBAC): Utilize RBAC to assign specific roles to users and grant permissions based on their responsibilities. This ensures that only authorized users can access the data they need for their tasks.

Least Privilege Principle: Apply the principle of least privilege, granting users only the minimum permissions necessary to perform their job functions. Restrict access to sensitive data to only those who require it.

Data Encryption: Utilize robust encryption algorithms to encrypt data both when stored and during transmission, guaranteeing that unauthorized access cannot decipher the information without the correct decryption keys, even in the event of a breach.

Multi-Factor Authentication (MFA): Enforce MFA to add an extra layer of security beyond passwords. Require users to provide additional authentication factors such as a one-time code sent to their mobile device or biometric verification.

Regular Security Audits: Perform routine security evaluations and audits to pinpoint vulnerabilities and uphold adherence to security protocols. Promptly rectify any identified weaknesses to minimize potential risks.

Monitoring and Logging: Implement robust monitoring and logging mechanisms to track user activities and detect suspicious behavior. Monitor access logs for unauthorized access attempts and promptly investigate any anomalies.

Data Masking: Apply data masking techniques to obfuscate sensitive information when displaying data to users who do not have the necessary permissions to view the full data. This helps prevent inadvertent exposure of confidential data.

Employee Training: Provide comprehensive security training to employees to raise awareness about the importance of data security and educate them on best practices for safeguarding sensitive information.

Get your new hires billable within 1-60 days. Experience our Capability Development Framework today.

  • Cloud Training
  • Customized Training
  • Experiential Learning
Read More

About CloudThat

Established in 2012, CloudThat is a leading Cloud Training and Cloud Consulting services provider in India, USA, Asia, Europe, and Africa. Being a pioneer in the cloud domain, CloudThat has special expertise in catering to mid-market and enterprise clients from all the major cloud service providers like AWS, Microsoft, GCP, VMware, Databricks, HP, and more. Uniquely positioned to be a single source for both training and consulting for cloud technologies like Cloud Migration, Data Platforms, DevOps, IoT, and the latest technologies like AI/ML, it is a top-tier partner with AWS and Microsoft, winning more than 8 awards combined in 11 years. Recently, it was recognized as the ‘Think Big’ partner from AWS and won the Microsoft Superstars FY 2023 award in Asia & India. Leveraging its position as a leader in the market, CloudThat has trained 650k+ professionals in 500+ cloud certifications and delivered 300+ consulting projects for 100+ corporates in 28+ countries.

WRITTEN BY Pankaj Choudhary



    Click to Comment

Get The Most Out Of Us

Our support doesn't end here. We have monthly newsletters, study guides, practice questions, and more to assist you in upgrading your cloud career. Subscribe to get them all!