Big Data, Cloud Computing

3 Mins Read

How to Secure Microsoft Fabric Data Warehouse?

Voiced by Amazon Polly

In this article, we will discuss how to secure your fabric data warehouse. Warehouse access and user permissions are controlled by a combination of granular SQL permissions and Microsoft Fabric permissions once linked. At the very least, you should have authorization to read Microsoft Fabric, which is necessary for warehouse connectivity. You can grant permissions for each Warehouse within a workspace to utilize Microsoft Fabric. It’s feasible to provide SQL permissions to a user via Microsoft Fabric item permissions, thus removing the need to grant access within SQL directly.

Customized Cloud Solutions to Drive your Business Success

  • Cloud Migration
  • Devops
  • AIML & IoT
Know More

Workspace Role

Within a fabric workspace, workspace roles are used to facilitate cooperation among development teams. The user’s actions are determined by their assigned role, which applies to every object in the workspace.

Workspace roles offer the following functionalities to each Warehouse and SQL analytics endpoint in the workspace:

  1. The Admin Role gives the user full read/write capabilities as well as the capacity to control specific user SQL permissions. Additionally, it Allows the user to see workspace-scoped sessions and monitor connections and requests in DMVs via TSQL and KILL sessions.
  2. Member Role gives the user full read/write capabilities as well as the capacity to control specific user SQL permissions.
  3. The contributor role enables the user to configure granular user SQL rights and receive complete read/write permissions.
  4. Viewer roll enables read-only and connects user access to all Warehouse and SQL analytics endpoints in the workspace.

Item Permission:

Item rights can be explicitly granted to specific Warehouses, as opposed to workspace roles, which apply to every item inside a workspace. The user will be granted access to that particular Warehouse. Enabling sharing for the Warehouse’s downstream consumption is the main goal of these rights.

SQL Granular Control:

A user can be easily granted granular access to the entire Warehouse with the help of workspace roles and item permissions. Nonetheless, there are situations when a user needs more specific access. Standard T-SQL constructs can be used to grant users specific permissions to accomplish this. For SQL analytics endpoint and Warehouse:

  • Security can be managed using GRANT, REVOKE, and DENY T-SQL syntax at the object level.
  • SQL roles, including both custom and pre-defined database roles, can be assigned to users.
  • User can view their permission using the sys.fn_my_permissions function.

Example:
• Database scoped permissions:

SELECT * FROM sys.fn_my_permissions(NULL, 'Database');

• Schema scoped permissions:
SELECT * FROM sys.fn_my_permissions('', 'Schema');
Schema scoped permissions:

SELECT * FROM sys.fn_my_permissions('.', 'Object');

 

Best practice to prevent unauthorized viewing of data:

Role-Based Access Control (RBAC): Utilize RBAC to assign specific roles to users and grant permissions based on their responsibilities. This ensures that only authorized users can access the data they need for their tasks.

Least Privilege Principle: Apply the principle of least privilege, granting users only the minimum permissions necessary to perform their job functions. Restrict access to sensitive data to only those who require it.

Data Encryption: Utilize robust encryption algorithms to encrypt data both when stored and during transmission, guaranteeing that unauthorized access cannot decipher the information without the correct decryption keys, even in the event of a breach.

Multi-Factor Authentication (MFA): Enforce MFA to add an extra layer of security beyond passwords. Require users to provide additional authentication factors such as a one-time code sent to their mobile device or biometric verification.

Regular Security Audits: Perform routine security evaluations and audits to pinpoint vulnerabilities and uphold adherence to security protocols. Promptly rectify any identified weaknesses to minimize potential risks.

Monitoring and Logging: Implement robust monitoring and logging mechanisms to track user activities and detect suspicious behavior. Monitor access logs for unauthorized access attempts and promptly investigate any anomalies.

Data Masking: Apply data masking techniques to obfuscate sensitive information when displaying data to users who do not have the necessary permissions to view the full data. This helps prevent inadvertent exposure of confidential data.

Employee Training: Provide comprehensive security training to employees to raise awareness about the importance of data security and educate them on best practices for safeguarding sensitive information.

Get your new hires billable within 1-60 days. Experience our Capability Development Framework today.

  • Cloud Training
  • Customized Training
  • Experiential Learning
Read More

About CloudThat

CloudThat is a leading provider of Cloud Training and Consulting services with a global presence in India, the USA, Asia, Europe, and Africa. Specializing in AWS, Microsoft Azure, GCP, VMware, Databricks, and more, the company serves mid-market and enterprise clients, offering comprehensive expertise in Cloud Migration, Data Platforms, DevOps, IoT, AI/ML, and more.

CloudThat is the first Indian Company to win the prestigious Microsoft Partner 2024 Award and is recognized as a top-tier partner with AWS and Microsoft, including the prestigious ‘Think Big’ partner award from AWS and the Microsoft Superstars FY 2023 award in Asia & India. Having trained 850k+ professionals in 600+ cloud certifications and completed 500+ consulting projects globally, CloudThat is an official AWS Premier Consulting Partner, Microsoft Gold Partner, AWS Training PartnerAWS Migration PartnerAWS Data and Analytics PartnerAWS DevOps Competency PartnerAWS GenAI Competency PartnerAmazon QuickSight Service Delivery PartnerAmazon EKS Service Delivery Partner AWS Microsoft Workload PartnersAmazon EC2 Service Delivery PartnerAmazon ECS Service Delivery PartnerAWS Glue Service Delivery PartnerAmazon Redshift Service Delivery PartnerAWS Control Tower Service Delivery PartnerAWS WAF Service Delivery PartnerAmazon CloudFront Service Delivery PartnerAmazon OpenSearch Service Delivery PartnerAWS DMS Service Delivery PartnerAWS Systems Manager Service Delivery PartnerAmazon RDS Service Delivery PartnerAWS CloudFormation Service Delivery PartnerAWS ConfigAmazon EMR and many more.

WRITTEN BY Pankaj Choudhary

Share

Comments

    Click to Comment

Get The Most Out Of Us

Our support doesn't end here. We have monthly newsletters, study guides, practice questions, and more to assist you in upgrading your cloud career. Subscribe to get them all!