The Ultimate Fabric Security Deep Dive You Didn’t Know You Needed
Proposed session for SQLBits 2026TL; DR
Microsoft Fabric delivers built‑in SaaS security for your entire data estate. Learn how Fabric authenticates users, protects data in OneLake, enforces access, secures inbound connections, and integrates with Purview for end‑to‑end governance.
Session Details
Microsoft Fabric is an end‑to‑end SaaS analytics platform that unifies data engineering, data science, Real-Time Analytics, and business intelligence on a single foundation: OneLake. Because Fabric is delivered as Software as a Service—not a traditional PaaS environment—it provides a fundamentally different security model. Many enterprise‑grade protections are built in by default, giving you strong guardrails for securing your data estate without having to assemble them yourself.
In this session, we’ll take a deep dive into how Fabric secures data across every layer of the platform. We will break down the security architecture and explore key topics such as:
- How authentication and identity enforcement work across Fabric experiences
- Network security patterns
- Ensuring data is only accessible to the right users through role‑based, item‑level, and workspace‑level controls
- How governed access to sensitive data is enforced within OneLake
- How Fabric stores, isolates, encrypts, and processes your data behind the scenes
- How Microsoft Purview integrates natively to provide end‑to‑end governance, lineage, classification, and policy enforcement
By the end of this session, you’ll clearly understand the security capabilities you get out of the box with Fabric and be equipped to have productive, informed conversations with your security team about adopting Fabric at scale.
In this session, we’ll take a deep dive into how Fabric secures data across every layer of the platform. We will break down the security architecture and explore key topics such as:
- How authentication and identity enforcement work across Fabric experiences
- Network security patterns
- Ensuring data is only accessible to the right users through role‑based, item‑level, and workspace‑level controls
- How governed access to sensitive data is enforced within OneLake
- How Fabric stores, isolates, encrypts, and processes your data behind the scenes
- How Microsoft Purview integrates natively to provide end‑to‑end governance, lineage, classification, and policy enforcement
By the end of this session, you’ll clearly understand the security capabilities you get out of the box with Fabric and be equipped to have productive, informed conversations with your security team about adopting Fabric at scale.
3 things you'll get out of this session
- Understand Fabric’s SaaS security model and how authentication, identity enforcement, and built‑in protections differ from traditional PaaS approaches.
- Gain deep insight into how Fabric secures data in OneLake, including encryption, isolation, access controls, and secure inbound connectivity patterns.
- Learn how to apply governance and compliance controls using Microsoft Purview for classification, lineage, access policies, and end‑to‑end data oversight.
Speakers
Kasper de Jonge's other proposed sessions for 2026
Unlocking AI Potential: Leveraging Your Data with Microsoft Fabric - 2026
Microsoft Fabric, Lakehouses and Power BI: A guide for BI developers - 2026
Kasper de Jonge's previous sessions
Fabric security: everything you need to know!
Learn how Microsoft Fabric makes sure your data is secure. Did you know for example that all data is encrypted by default? Or that you can configure MFA for all your users? Fabric offers many of these possibilities and more out of the box without most of us knowing! In this session you will learn everything to convince your security team
Understanding Zero Trust security
In this session we will look at what Zero Trust principles are. Zero Trust is the modern way to apply security. It assumes a breach, verifies every user, and enforces least privilege, giving users access only to the private applications and resources they need. It no longer secures the perimeter (the network boundaries) which doesn't scale in the modern world.
We will see how it applies to your Microsoft services like Microsoft Fabric too.