Summary
In this chapter, you learned about encryption at rest and in transit, enabling auditing for ADLS and Synapse SQL, implementing data masking, RBAC and ACL rules, row- and column-level security, and data retention and purging. You also gained knowledge about secure endpoints and details about tokens and encryption in Spark.
By now, you have covered all the important topics relating to handling security and privacy. You should now be able to design and implement a complete security and privacy solution on top of ADLS.
You will be exploring monitoring for data storage and data processing in the next chapter.