Customer-Managed Keys Now Available for Fabric Warehouse and SQL Analytics Endpoint
Microsoft Fabric Blog details the introduction of Customer-Managed Keys for Fabric Warehouse and SQL Analytics Endpoint, empowering organizations to enhance security and compliance through Azure Key Vault integration.
Bringing Customer-Managed Keys to Fabric Warehouse and SQL Analytics Endpoint
With the latest update, organizations can now gain increased control and assurance over the encryption of their most critical analytical workloads within Microsoft Fabric.
Why Customer-Managed Keys Matter
- Enhanced Control: Move beyond Microsoft-managed keys and enable your organization to control and manage encryption keys for compliance and governance.
- Bring Your Own Key (BYOK): Store and manage your own encryption keys in Azure Key Vault and apply them to Fabric Warehouse and SQL Analytics Endpoint.
- Stronger Security: Enforce lifecycle operations like key rotation and revocation to meet regulatory requirements.
- Compliance Alignment: Address internal and industry-specific compliance needs for data protection and auditability.
Scope of Encryption
- Preview Features: Currently, Customer-Managed Keys encrypt metadata, such as SQL objects (tables, views, stored procedures, and functions).
- Planned Enhancements: Future updates will expand encryption to cover saved queries and further operational artifacts.
- Continuous Protection: All Fabric data at rest, including OneLake storage, continues to be encrypted. CMK allows you to select which keys are used for this data.
Organizational Benefits
- Protection Beyond Raw Data: Not just the data but also the logical structure and metadata are protected under your management.
- Granular Lifecycle Operations: You can rotate, disable, or revoke keys as needed, with Fabric respecting these changes across workloads.
- Consistent Enterprise Governance: Align Fabric security controls with those in other Azure services (e.g., Storage, Synapse, Key Vault).
How to Enable CMK
- Create or select an encryption key in Azure Key Vault.
- Create a Service Principal Name (SPN) to facilitate communication between Fabric and Azure Key Vault.
- Enable CMK within your Fabric Workspace’s security settings.
- Monitor configuration progress directly in the workspace security interface.
- Upon successful encryption, check the CMK status (should read “Active”).
Transparency and Control
By bringing CMK into Fabric Warehouse and SQL Analytics Endpoint, you are empowered to decide which keys protect your organization’s metadata, determine rotation schedules, and maintain full control over your cryptographic governance. Integration with Azure Key Vault ensures you govern every aspect of the key lifecycle, enhancing trust and compliance.
Learn More
- About keys, secrets, and certificates in Azure Key Vault
- Customer-managed keys in Fabric Workspaces
- Customer-managed keys for Azure Storage
This post appeared first on “Microsoft Fabric Blog”. Read the entire article here