Access control
Without a doubt, controlling access to services and the data stored in them plays a major role in a successful data security strategy. We can control permissions of services using role-based access control (RBAC), have fine-grained or temporal access to data lakes using shared access signatures, and put methods in place to control access for different user groups in the same database or data warehouse. Note that there are still other methods of controlling access on Azure that are not covered in this book. We are covering the most important ones, starting with RBAC.
RBAC
Identity and Access Management (IAM) is a broad topic and is of most importance to the Azure administrator. However, a good cloud data architect knows at least the core principles as well. IAM forms the foundation for many concepts in access control. IAM is designed to allow the verification and management of (digital) entities, which could refer to a person, a group of people, an application,...