22-25 April 2026

The Ultimate Fabric Security Deep Dive You Didn’t Know You Needed

Proposed session for SQLBits 2026

TL; DR

Microsoft Fabric delivers built‑in SaaS security for your entire data estate. Learn how Fabric authenticates users, protects data in OneLake, enforces access, secures inbound connections, and integrates with Purview for end‑to‑end governance.

Session Details

Microsoft Fabric is an end‑to‑end SaaS analytics platform that unifies data engineering, data science, Real-Time Analytics, and business intelligence on a single foundation: OneLake. Because Fabric is delivered as Software as a Service—not a traditional PaaS environment—it provides a fundamentally different security model. Many enterprise‑grade protections are built in by default, giving you strong guardrails for securing your data estate without having to assemble them yourself.

In this session, we’ll take a deep dive into how Fabric secures data across every layer of the platform. We will break down the security architecture and explore key topics such as:
- How authentication and identity enforcement work across Fabric experiences
- Network security patterns
- Ensuring data is only accessible to the right users through role‑based, item‑level, and workspace‑level controls
- How governed access to sensitive data is enforced within OneLake
- How Fabric stores, isolates, encrypts, and processes your data behind the scenes
- How Microsoft Purview integrates natively to provide end‑to‑end governance, lineage, classification, and policy enforcement

By the end of this session, you’ll clearly understand the security capabilities you get out of the box with Fabric and be equipped to have productive, informed conversations with your security team about adopting Fabric at scale.

3 things you'll get out of this session

- Understand Fabric’s SaaS security model and how authentication, identity enforcement, and built‑in protections differ from traditional PaaS approaches. - Gain deep insight into how Fabric secures data in OneLake, including encryption, isolation, access controls, and secure inbound connectivity patterns. - Learn how to apply governance and compliance controls using Microsoft Purview for classification, lineage, access policies, and end‑to‑end data oversight.