AzureFunBytes Episode 44 - @Azure Data Factory Security with @narainabhishek

Jay Gordon - May 20 '21 - - Dev Community

AzureFunBytes is a weekly opportunity to learn more about the fundamentals and foundations that make up Azure. It's a chance for me to understand more about what people across the Azure organization do and how they do it. Every week we get together at 11 AM Pacific on Microsoft LearnTV and learn more about Azure.

AzureFunBytes animation

This is part two of our series on Azure Data Factory. Last time Mark helped get us on the road to understanding how to best get our data into the cloud by using the linked services and tools with Azure Data Factory. Data Factory contains a series of interconnected systems that provide a complete end-to-end platform for data engineers. Utilizing our data requires some thoughtfulness when it comes to security.

This week on AzureFunBytes, Senior Program Manager, Abishek Narain joins me to learn more about security best practices for Data Engineers.

Our Agenda:

  • Authentication
  • Meta-data encryption (Meta-data at rest)
  • Credential management
  • Data in transit
  • Data at rest
  • Network Security
  • Azure Policy integration

With all of this in mind, we take a deeper look at how security not only impacts our applications deployed, but the data they may access and store.

00:04:46 - Let's meet Abishek
00:09:13 - Azure Data Factory: Best practices for data engineers
00:14:49 - Authentication
00:21:53 - Meta-data encryption (at rest)
00:25:10 - Credential management
00:35:57- Data in transit & data at rest
00:38:33 - Network security
00:43:58 - Custom RBAC roles
00:46:23 - Demo Time!

When securing your data pipeline, there are some configurations and settings suggested by Azure you should follow. You'll want to follow this security baseline that applies guidance from the Azure Security Benchmark version1.0 to Azure Data Factory. You'll also want to ensure login details to your data endpoints are protected to ensure there's no unauthorized access due to credentials existing in the wild. There are also network security considerations that you will want to adhere to for various data stores that are accessed by Azure Data Factory, whether they are in the cloud or on-prem.


Learn about Azure fundamentals with me!

Live stream is available on Twitch, YouTube, and LearnTV at 11 AM PT / 2 PM ET Thursday. You can also find the recordings here as well:

AzureFunBytes on Twitch
AzureFunBytes on YouTube
Azure DevOps YouTube Channel
Follow AzureFunBytes on Twitter

Useful Docs:

AzureFunBytes Episode 43 - Intro to @Azure Data Factory with @KromerBigData
Get $200 in free Azure Credit
Microsoft Learn: Introduction to Azure fundamentals
Azure security baseline for Azure Data Factory
Security considerations for data movement in Azure Data Factory
What is Data Factory?
Data access strategies
Azure Key Vault secrets in pipeline activities
Azure Policy documentation
Compute environments supported by Azure Data Factory
Managed identity for Data Factory
RBAC - Role Based Authentication Control

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Terabox Video Player