Why do so many Microsoft Fabric implementations start strong but become difficult to manage as adoption grows? The platform brings data engineering, warehousing, real-time analytics, and business intelligence into a single environment, reducing reliance on multiple tools. This consolidation increases the volume of users, data assets, and dependencies within the same ecosystem, making governance a foundational requirement from the very beginning.
As data expands across workspaces, domains, and capacities, gaps in governance begin to surface. Sensitivity labels may be applied inconsistently, ownership can become unclear, and unrestricted workspace creation leads to duplication and sprawl. These issues directly impact compliance, data reliability, and decision-making speed. Microsoft Purview adds classification, lineage, and data protection capabilities, but their effectiveness depends on how well governance is structured upfront.
In this article, we will cover the key Microsoft Fabric governance practices required to organize the data estate, enforce security and compliance, improve data discovery and trust, and monitor activity effectively as the platform grows.
Key Takeaways
- Microsoft Fabric governance spans four pillars: data estate management, security and compliance, data discovery and trust, and monitoring. Each requires deliberate setup from day one.
- Domains and subdomains let organizations structure Fabric governance by business unit, with settings that cascade from tenant level down to domain and workspace level.
- Sensitivity labels from Purview Information Protection persist when data is exported out of Fabric via supported paths, meaning protection follows the data regardless of where it goes.
- DLP policies in Fabric actively detect and restrict sensitive data in lakehouses, warehouses, semantic models, and KQL databases. They can block access and alert admins in real time, not just flag violations.
- The OneLake catalog is embedded in Microsoft Teams, Excel, and Copilot Studio, making governed data accessible where people already work without needing to open Fabric directly.
What Is Microsoft Fabric Governance?
Microsoft Fabric governance is the combination of policies, controls, and tools that determine how data is managed, accessed, protected, and discovered across the platform. It is not a single setting or a feature that gets switched on. It operates across four distinct areas, each with its own native Fabric capabilities, and most of them extend further when Microsoft Purview is connected.
The four pillars here are managing your data estate, securing and protecting data, encouraging data discovery and trust, and monitoring activity to get actionable insights. Organizations that treat all four as equally important from day one are in a materially stronger position than those that address them in sequence or skip some entirely.
Partner with Kanerika to Modernize Your Enterprise Operations with High-Impact Data & AI Solutions
Managing Your Data Estate in Microsoft Fabric
The first layer of Microsoft Fabric governance is structural. Before data is classified or access is controlled, the estate itself needs to be organized. Fabric provides a hierarchy for this: tenant, capacity, domain, and workspace. Each level has its own governance controls, and how they are configured determines how well everything below holds up.
1. The Admin Portal
The Admin Portal is the central control point for Fabric administrators. It covers everything from tenant-wide settings and capacity management to domain configuration and user access controls. Key things admins can do from here:
- Manage tenant-wide settings and control which Fabric workloads are active across the organization
- Govern capacities and assign workspaces to the right capacity for each environment
- Use the dedicated Manage Workloads tab to see which workloads are running, where they are assigned, and what resources they are consuming
- Delegate domain and capacity management to specific admins so governance is distributed without becoming inconsistent
Platform and IT owners should be the people with Admin Portal access. It is not a role to distribute widely.
2. Tenant and Workspace Settings
Governance in Fabric is layered across three tiers, each with its own scope of control:
- Tenant admins configure platform-wide settings that apply across the entire organization. These are the non-negotiables.
- Domain admins can override specific settings that have been delegated down to the domain level for their business unit
- Workspace owners set their own more granular controls within the workspace, specific to their team’s needs
This model lets compliance requirements be enforced from the top while giving business units the flexibility to manage what is specific to their data and regulations.
3. Domains and Subdomains
Domains are logical groupings of workspaces organized by business function such as Finance, HR, or Operations. Each domain can have its own admin, policies, and data steward. There are three roles in domain management:
- Fabric Admin can create, edit, and delete domains, assign domain admins and contributors, and has visibility across all domains in the tenant
- Domain Admin can configure domain settings, update descriptions, define contributors, and assign workspaces. Should be a business owner or subject matter expert, not just a technical administrator
- Domain Contributor is a workspace admin authorized to assign their workspace to a domain, working from inside workspace settings rather than the Admin Portal
One important clarification: domain assignment does not affect item visibility or user access. Access still depends on workspace roles and item permissions. What domains control is discoverability.
Subdomains add a further grouping layer for organizations with more complex internal structures. Business and enterprise architects should design the domain structure before workspaces are created.
In practice, domain design gets skipped more often than any other governance step. Teams create workspaces first, then try to retrofit domains onto an estate that has already grown — and the catalog never reflects reality after that. The fifteen minutes spent on a domain map before provisioning saves weeks of cleanup later.
4. Workspaces
Workspaces are the working environments where teams build Fabric items and collaborate. Fabric admins control who can create them, and workspace admins define Spark environments reusable across the team. A few things to get right from the start:
- Give individual developers isolated workspaces for development work so they do not interfere with shared environments
- Restrict who can create workspaces. Without a creation policy, sprawl accumulates fast with no clear ownership or catalog visibility
- Define Spark environments at the workspace level so teams are not each configuring compute from scratch
Restricting workspace creation from day one is one of the highest-return governance decisions a Fabric admin can make.
5. Capacities
Capacities are the compute resources that all Fabric workloads run on. From a governance perspective, they act as isolation boundaries between workloads and environments. The recommended approach:
- Split capacities by environment type: development, test, acceptance, and production
- This prevents development workloads from consuming production resources
- It also makes chargeback trackable by business unit or department
One distinction worth knowing: workspaces are assigned to capacities, not to domains. A domain can span multiple capacities, and a single capacity can hold workspaces from different domains. They are separate dimensions of organization.
6. Metadata Scanning
Metadata scanning is how Fabric makes its full data inventory visible to external cataloging tools and to Purview’s Data Map. It works through Admin REST APIs called scanner APIs. What they extract from each Fabric item:
- Item name, ID, and owner
- Sensitivity label and endorsement status
- For datasets specifically: table names, column names, DAX expressions, and measures
There are four scanner APIs in total. They give governance teams a full programmatic inventory of the Fabric tenant without manually inspecting each workspace. This metadata feeds into Purview’s unified catalog or any third-party tool that supports the Atlas API.
How Does Access Control Work in Microsoft Fabric Governance?
Access in Microsoft Fabric governance is controlled at multiple levels simultaneously. Workspace roles set the broad permissions. Item permissions allow more targeted sharing below the workspace level. Data-level security restricts what specific users can see within a dataset or lakehouse, regardless of how they access it.
1. Admin
Full control over the workspace. Admins manage access, configure workspace settings, and publish content to apps. This role should be tightly restricted to people who actually need to manage the environment, not to everyone who works in it.
Over-assigning Admin access during pilots is one of the most common Microsoft Fabric governance mistakes teams make, and it is hard to walk back once production begins.
2. Member
Can edit and publish content, and manage data sources. Members typically are data engineers or analysts who own the work inside the workspace. They have broad permissions and should be users who are actively building or maintaining items.
3. Contributor
Can create and edit content but cannot publish to an app. This is the right role for team members who are actively building, testing, or iterating on content but should not be pushing changes to production outputs.
4. Viewer
Read-only access to published content. Viewers can see reports and dashboards but cannot edit items or access underlying data. This is the correct role for business stakeholders who consume outputs.
5. Item Permissions
Below the workspace level, item permissions let admins share specific datasets, reports, or lakehouses with individual users without granting any workspace access. This is how organizations manage cross-team data sharing without exposing the broader environment.
The failure mode here is the opposite of workspace over-permissioning: teams over-restrict, creating a shadow sharing culture where people email files instead of using governed paths. Item permissions exist to solve that without opening the workspace.
6. Row-Level and Column-Level Security
For sensitive data, row-level security (RLS) and column-level security (CLS) restrict what a user can see at the data layer itself. RLS, configured through DAX filter expressions in semantic models, controls which rows are visible based on the user’s identity. CLS controls which columns are exposed.
Fabric provides these data-level controls for SQL analytics endpoints, warehouses, Direct Lake, and KQL databases. Both apply regardless of how the data is accessed, whether through Power BI, Excel, or an API call. The security follows the data, not the tool.
RLS is frequently set up in development and not tested with production user identities before go-live. Test RLS with actual user accounts, not admin credentials.
Securing and Protecting Data in Microsoft Fabric
This layer of Microsoft Fabric governance is about active protection. The tools here classify data before it moves, block violations in real time, and produce the audit trails that compliance teams and regulators ask for.
1. Sensitivity Labels and Information Protection
Sensitivity labels from Microsoft Purview Information Protection can be applied to any Fabric item, manually by a user or automatically through a label policy. Fabric supports three labeling approaches:
- Default labeling automatically applies a label to unlabeled content across the tenant, so nothing slips through unclassified
- Mandatory labeling requires users to apply a label before content can be published or shared, making classification a required step rather than an optional one
- Label inheritance means items automatically inherit the sensitivity label of their upstream data source, so labels travel with the data as it moves through pipelines
Label inheritance sounds clean in theory. In practice, if upstream sources have inconsistent or missing labels, inheritance propagates the gaps downstream. The first step before enabling inheritance is auditing source label coverage.
What makes labels worth configuring properly is persistence. Once a label is applied, it stays with the data even when it is exported out of Fabric via Excel, PowerPoint, PDF, or PBIX files. A label set inside Fabric survives the export.
This closes one of the most common gaps in enterprise environments, where protection that exists only inside the platform disappears the moment data leaves it. Label policies should be defined at the organizational level in the Microsoft Purview portal and applied tenant wide.
2. Data Loss Prevention Policies
DLP policies actively detect sensitive information as it is uploaded into supported Fabric items, including lakehouses, warehouses, databases, and semantic models. When a policy match is detected, the policy does not just log it. It takes action.
Depending on how the policy is configured, it can:
- Attach a policy tip to the item, showing the data owner exactly what sensitive content was detected and why it triggered
- Generate an alert for security administrators in the Purview compliance portal, with full audit detail
- Restrict access to the item entirely until the issue is resolved, blocking all users except the data owner
DLP rules are built using sensitive information types, which include pre-built detection patterns for credit card numbers, social security numbers, health information, and financial records. Organizations can also create custom types for proprietary data. Policies can be scoped to specific workspaces rather than the entire tenant.
Scoping DLP to the entire tenant at rollout is the most common way to generate enough false positives that admins start ignoring alerts. Start scoped to one or two high-sensitivity workspaces, validate the rules, then expand.
3. Auditing with Microsoft Purview
Every user activity in Fabric is logged in the Microsoft Purview audit log. This covers Lakehouse access, Power BI report views, Spark job runs, Data Factory pipeline executions, logins, and sensitivity label changes across all workloads. Compliance teams can search and retrieve audit events directly from the Purview compliance portal.
For organizations under GDPR, HIPAA, or SOX, these logs are not optional. They are the evidence that data was handled appropriately and the starting point for any forensic investigation. Fabric admins and compliance teams should have a defined process for how these logs are reviewed, not just an awareness that they exist.
4. Insider Risk Management
Microsoft Purview Insider Risk Management integrates with Fabric to detect behavioral patterns associated with data theft or leakage. IRM policies come with ready-to-use risk indicators for Fabric-specific activities, including Power BI access patterns and lakehouse interactions.
When an indicator is triggered, it feeds into a broader insider risk investigation workflow across the Microsoft security stack. For organizations handling sensitive financial, healthcare, or personal data, this layer adds behavioral detection on top of the classification and DLP controls already in place.
Microsoft Fabric: The Undisputed #1 Analytics Platform
Learn why Microsoft Fabric is the #1 analytics platform with AI-powered insights and unified data.
Microsoft Fabric Governance for Data Discovery, Trust, and Reuse
A governed data estate is not just secure. It needs to be usable. Teams should be able to find the right data, know whether it is reliable, and reuse it without starting from scratch. Microsoft Fabric governance includes a set of tools built specifically for this.
1. The OneLake Catalog
The OneLake catalog is the central hub in Fabric for finding, exploring, and governing data. It has three tabs, each with a distinct job:
- Explore tab shows all Fabric items a user has access to across the organization, filterable by domain, tag, endorsement, and workspace. It is also embedded in Microsoft Teams, Excel, and Copilot Studio.
- Govern tab is built for data owners and admins. It shows curation completeness, endorsement status, and sensitivity label coverage, plus a prioritized list of recommended actions to improve governance posture.
- Secure tab provides a unified view of workspace roles and OneLake security roles across items. Admins can audit permissions and manage security roles from one place without jumping between workspaces.
2. Endorsement
Endorsement is how organizations mark which data items are trustworthy and production-ready. Three levels represent different stages of trust:
- Promoted is set by item owners to signal the item is ready for broader team use
- Certified is set by authorized users to confirm the item meets organizational quality standards
- Master Data designates the item as the authoritative source for a specific data domain
Endorsed items are labeled clearly in Fabric and prioritized in catalog searches. Certification authority should sit with domain admins, who authorize data owners to certify items they have verified.
Certification programs stall when the authority to certify is unclear. If no one has been explicitly designated to certify items in a domain, the Certified tier stays empty and teams default to using whatever dataset is most familiar.
3. Tags
Tags are text labels that Fabric administrators define and data owners apply to items. They sit on top of domain and endorsement as an additional classification layer, useful for organizing content by topic, project, or business function.
Tags work well when administrators define them upfront as a controlled vocabulary. When data owners self-define tags, you end up with ‘Finance,’ ‘finance,’ ‘FIN,’ and ‘Q3-Finance’ all meaning the same thing — and the catalog becomes unsearchable.
4. Data Lineage and Impact Analysis
Lineage gives users a visual map of how data moves from its source through pipelines and transformations into reports. Two capabilities sit here:
- Lineage view is available in every workspace to users with Admin, Member, or Contributor access. It shows item relationships and data flow at a glance.
- Impact analysis shows exactly which downstream reports, dashboards, and processes depend on a specific item before any change is made.
With Purview connected, lineage extends beyond the workspace to cover the full estate from original source systems through to the final Power BI report.
How to Monitor Microsoft Fabric Governance
Governance requires ongoing visibility, not just setup. Microsoft Fabric provides several tools for monitoring what is happening across the tenant and surfacing the information admins and data owners need to act.
1. The Monitoring Hub
The Monitoring Hub lets Fabric users monitor activities from a central location. It shows scheduled pipeline refreshes, Spark job runs, data warehouse queries, and other Fabric workload activity. Access is based on item permissions, so users see activity only for items they have permission to view.
The Monitoring Hub is frequently mistaken for a governance tool. It shows activity, not compliance posture. Developers should own it. The Purview Hub is where governance visibility actually lives.
2. The Purview Hub
The Purview Hub is a centralized page inside Fabric specifically for Fabric administrators and data owners. It has two components. The first is a set of reports covering sensitivity label coverage by item type and workspace, endorsement status across the tenant, and domain-level breakdowns. The second is a gateway to the full Microsoft Purview portal, where more advanced capabilities like Information Protection, DLP, and Audit are accessible.
The Purview Hub report retains data for 30 days, including metadata for deleted capacities, workspaces, and items. Access to the Purview Hub requires the Fabric Administrator role or higher.
3. Admin Monitoring Workspace
The Admin Monitoring Workspace is available to tenant admins and provides a broader operational view of the Fabric platform. Pre-built reports and datasets cover usage patterns, adoption trends, actively used capacities, underused capacities, workspace activity, and the overall pulse of the data estate.
The Feature Usage and Adoption report is most useful three to six months post-launch, when there is enough activity history to identify real patterns. Running it at week two produces noise, not insight.
4. Capacity Metrics
The Capacity Metrics app gives platform owners and administrators visibility into resource usage across all Fabric capacities. It shows workload performance, consumption patterns, and capacity utilization trends, which helps admins make data-driven decisions about whether to scale up, pause, or reorganize capacity assignments.
5 Common Microsoft Fabric Data Governance Mistakes
Most governance failures in Fabric come from setup decisions made early, not from missing features. These are the patterns that create the most damage.
1. Treating governance as a post-launch task
Many teams plan to add governance once the platform is stable. By then, datasets are in production, roles are informally assigned, and sensitive data has moved without classification. Undoing that is significantly more work than setting it up correctly at the start.
2. Over-permissioning during the pilot
Giving everyone Admin or Member access to move faster during a proof of concept is common. When the pilot becomes production, those permissions stay. Auditing and correcting an over-permissioned environment takes considerably more time than assigning roles correctly from the beginning.
3. Skipping domain design
Jumping straight to workspaces without designing the domain structure first means workspaces are created without context, ownership is unclear, and the OneLake catalog provides no useful filtering.
4. Not connecting Purview until a compliance event forces it
At that point, lineage data for earlier work is missing, sensitivity labels were never applied to historical items, and the audit trail has gaps.
5. Ignoring workspace sprawl
Without a creation policy, workspaces accumulate. Unmanaged workspaces have unclear ownership, inconsistent role assignments, and no catalog visibility. They become governance blind spots with no straightforward path to cleanup.
Best Microsoft Fabric Governance Practices
Getting Microsoft Fabric governance right requires decisions made at setup, not corrections made later. These are the practices that hold up as deployments grow.
| Practice | What to Do | Why It Matters |
|---|---|---|
| Start with domain structure | Define domains before creating workspaces | Ensures clear ownership and better data discovery from day one |
| Restrict workspace creation | Allow only admins or approved users to create workspaces | Prevents workspace sprawl and keeps governance manageable |
| Apply sensitivity labels at org level | Set label policies in Purview and enforce tenant-wide | Keeps classification consistent across all data |
| Enable DLP early | Set up DLP policies before moving data to production | Avoids gaps and reduces risk of sensitive data exposure |
| Enable audit logs from day one | Turn on Purview Audit at the start | Ensures full activity tracking for compliance and investigations |
| Use certified datasets | Promote and certify datasets in the catalog | Helps teams rely on trusted and approved data |
| Sync Entra groups to roles | Assign access using Microsoft Entra ID groups | Makes access control scalable and easier to manage |
| Connect Purview early | Integrate Purview from the beginning | Avoids missing lineage, labels, and audit history |
Case Study: Compliance Adherence with Microsoft Purview Implementation
The client is a top North American healthcare organization, renowned for high-quality patient care and medical research. With a network of hospitals, clinics, and specialty centres, it serves millions annually. Utilizing advanced technology and innovative practices, the organization enhances patient outcomes, streamlines operations, and ensures regulatory compliance. Their data ecosystem includes electronic health records, medical imaging, and administrative databases.
Challenges:
- Data spread across Azure Blob Storage, SQL databases, and SaaS applications, making it difficult to discover and manage data efficiently
- Lack of a consistent framework for data classification and metadata management, leading to inefficiencies and substandard data quality
- Inadequate stakeholder engagement and a lack of understanding of data governance practices, impeding effective data management and integration
Solutions:
- Used MS Purview to create a centralized data catalogue that included comprehensive metadata and data classifications, enhancing data discovery and management
- Designed a data classification framework to streamline data classifications, steward roles, and usage policies to ensure consistent data handling and improved data quality
- Integrated Power BI dashboards to deliver better business insights by connecting diverse data sources and created user guides and process documentation for ongoing governance practices
Results:
- 57% Reduction in Data Discovery Time
- 90% Increase in Compliance Adherence
- 70% Enhancement in Data Accessibility
How Kanerika Implements Microsoft Fabric Governance
Kanerika is a premier provider of data-driven software solutions and services that facilitate digital transformation. Specializing in Data Integration, Analytics, AI/ML, and Cloud Management, Kanerika prides itself on its expertise in employing cutting-edge technologies and agile methodologies to ensure exceptional outcomes.
Kanerika’s governance suite, built on Microsoft Purview, covers three distinct areas. KANGovern handles data governance strategy and enforcement, defining the policies and ownership structures that make governance work across the organization. KANComply provides the regulatory compliance framework for GDPR, HIPAA, and CCPA, ensuring sensitivity labels, DLP policies, and audit configurations are aligned to each industry’s requirements.
KANGuard prevents unauthorized access and enforces data security across the estate, working at both the platform and data layer. We also hold ISO 27001 and ISO 27701 certifications, is SOC II Type II compliant, and is GDPR compliant. For clients in regulated industries, vendor compliance is a baseline requirement, not a differentiator.
Transform Your Business with AI-Powered Solutions!
Partner with Kanerika for Expert AI implementation Services
FAQs
What is Microsoft Fabric governance?
Microsoft Fabric governance is the set of controls, policies, and tools that manage how data is organized, accessed, protected, and discovered across the platform. It covers four areas: data estate management through the Admin Portal, domains and workspaces; security through sensitivity labels, DLP, and auditing; data discovery through the OneLake catalog and endorsement; and monitoring through the Purview Hub and admin workspace.
How does Microsoft Purview integrate with Microsoft Fabric?
Purview connects to Fabric through the Purview Hub inside the platform. It extends Fabric’s native controls with automated sensitivity classification, data loss prevention policies, end-to-end lineage tracking, and compliance monitoring across GDPR, HIPAA, and other frameworks.
What roles are available in Microsoft Fabric workspaces?
Fabric has four workspace roles. Admin has full control including access management and publishing. Member can edit content, manage data sources, and publish to an app. Contributor can edit content but cannot publish. Viewer has read-only access to published content. Below workspace roles, item permissions allow admins to share specific datasets or reports with users who should not have access to the broader workspace.
How do DLP policies work in Microsoft Fabric?
DLP policies detect sensitive information as it is uploaded into supported Fabric items including lakehouses, warehouses, databases, and semantic models. When a policy match is detected, the policy can attach a policy tip to the item for the data owner, generate an alert for security admins, or restrict access to the item entirely. Policies are configured in the Microsoft Purview portal and can be scoped to specific workspaces.
What is the OneLake catalog in Microsoft Fabric
The OneLake catalog is the central hub for finding, exploring, and governing Fabric data. It has three tabs: Explore for browsing and filtering items across the organization, Govern for seeing governance posture and recommended actions, and Secure for managing access roles and permissions. The catalog is embedded in Microsoft Teams, Excel, and Copilot Studio.
What is endorsement in Microsoft Fabric?
Endorsement is how data owners and organizations mark which Fabric items are trustworthy and production-ready. There are three levels: Promoted, set by item owners; Certified, set by authorized users who have verified the item meets quality standards; and Master Data, which designates the item as an authoritative source for a data domain.



