Implementing Data Security
In this chapter, you will learn how to recognize sensitive information and implement various sensitive information-handling techniques, such as data masking, row- and column-level security, role-based access and access-controlled lists, encryption, and more. These skills will enable you to design and maintain the security of your data lake and ensure customer privacy.
Note
This chapter primarily focuses on the Implementing data security topic of the DP-203: Data Engineering on Microsoft Azure exam.
By the end of this chapter, you will be able to answer questions on the following confidently:
- Data masking and data encryption for data at rest and in motion
- Row-level and column-level security
- Azure Role-Based Access Control (RBAC)
- POSIX-like Access Control Lists (ACLs) for ADLS Gen2
- Data retention policy and secure endpoints (private and public)
- Resource tokens in Azure Databricks
- DataFrames and sensitive information ...