👤 Who is this for?

IT Admin Data Architect Platform Owner — This section covers data governance frameworks, Microsoft Purview integration, security models, workspace roles, RLS/CLS, and network security in Fabric.

Section 05

Governance

Establishing data governance, cataloging, quality, and trust across your Fabric environment.

Governance Framework

Effective governance in Fabric combines Microsoft Purview for cataloging and lineage, endorsement for trust signals, sensitivity labels for data protection, and organizational policies for access control.

Microsoft Purview Integration

Data Domains & Ownership

Organize your Fabric workspaces into logical domains (e.g., Finance, HR, Marketing) to align with business ownership.

Endorsement

Fabric provides two endorsement levels to signal trust in artifacts:

Promoted

Workspace members can promote artifacts to indicate they're ready for broader use. A lightweight signal that says "this is reliable."

Certified

Only designated reviewers can certify artifacts. This is the highest trust level — it means the artifact meets organizational quality and governance standards.

✅ Best Practice

Establish a certification process: define criteria (documentation, testing, data quality checks) that an artifact must pass before being certified. Only Gold-layer datasets and production reports should be certified.

Sensitivity Labels

Microsoft Information Protection (MIP) sensitivity labels can be applied to Fabric artifacts to classify and protect data:

Data Quality

Section 06

Security

Securing your data at every layer — from workspace access to row-level permissions.

Security Model Overview

Fabric implements a defense-in-depth approach with multiple security layers: identity, workspace, item, data, and network.

Workspace Roles

Every workspace has four built-in roles that control what users can do:

RolePermissionsTypical Assignment
AdminFull control: manage access, delete workspace, configure settingsWorkspace owners, IT admins
MemberCreate, edit, delete artifacts; publish reports; share itemsData engineers, developers
ContributorCreate and edit artifacts, but cannot share or manage accessAnalysts, junior developers
ViewerView and interact with artifacts (read-only)Business users, stakeholders

Data-Level Security

Row-Level Security (RLS)

RLS restricts data access at the row level based on user identity. Configure RLS in Power BI semantic models or Warehouse T-SQL:

T-SQL — Row-Level Security in Warehouse
-- Create a security predicate function
CREATE FUNCTION dbo.fn_security_predicate(@Region AS nvarchar(50))
RETURNS TABLE
WITH SCHEMABINDING
AS
RETURN SELECT 1 AS result
WHERE @Region = USER_NAME()
   OR USER_NAME() = 'admin@contoso.com';

-- Apply security policy to a table
CREATE SECURITY POLICY RegionFilter
ADD FILTER PREDICATE dbo.fn_security_predicate(Region)
ON dbo.SalesData
WITH (STATE = ON);

Column-Level Security (CLS)

CLS restricts access to specific columns. Use GRANT and DENY statements on individual columns in Fabric Warehouse:

T-SQL — Column-Level Security
-- Deny access to salary column for a specific role
DENY SELECT ON dbo.Employees(Salary) TO [LimitedAccess];

-- Grant access to only specific columns
GRANT SELECT ON dbo.Employees(EmployeeId, Name, Department) TO [LimitedAccess];

OneLake Data Access Roles

OneLake data access roles provide fine-grained access control at the folder level within a lakehouse. You can restrict users to specific folders or tables without granting access to the entire lakehouse.

Network Security

🔒 Security Checklist

Enable Entra ID Conditional Access  |  Implement RLS on all customer-facing reports  |  Use service principals (not user accounts) for automation  |  Enable audit logs  |  Apply sensitivity labels  |  Review workspace access quarterly