Costa Rica
Last updated: 2025-07-17
| Feature | Description |
|---|---|
| Unified Data Integration | Combines citizen and professional data integration |
| Connectivity | Supports over 100 different data sources |
| Automation | Uses AI and metadata for data enrichment |
| Scalability | Handles large-scale data operations efficiently |
| Security | Ensures data security and compliance |
graph LR
A[Microsoft Fabric Capabilities]
subgraph Extraction
direction TB
B1[Relational Databases]
B2[Non-Relational Databases]
B3[Data Lakes]
B4[Data Warehouses]
B5[APIs]
B6[File Systems]
B7[Cloud Services]
B8[Streaming Data]
end
subgraph Storage
direction TB
C1[Data Lakes]
C2[Data Warehouses]
C3[Databases]
C4[File Systems]
C5[Data Lakehouses]
end
A --> Extraction
A --> Storage
| Capability Type | Source/Storage Type | Examples |
|---|---|---|
| Extraction | Relational Databases | SQL Server, Oracle, MySQL, PostgreSQL |
| Extraction | Non-Relational Databases | MongoDB, Cassandra |
| Extraction | Data Lakes | Azure Data Lake, Amazon S3 |
| Extraction | Data Warehouses | Azure Synapse Analytics, Snowflake |
| Extraction | APIs | REST APIs, OData |
| Extraction | File Systems | CSV, JSON, XML files |
| Extraction | Cloud Services | Azure Blob Storage, Google Cloud Storage |
| Extraction | Streaming Data | Kafka, Event Hubs |
| Storage | Data Lakes | Azure Data Lake Storage, Amazon S3 |
| Storage | Data Warehouses | Azure Synapse Analytics, Snowflake |
| Storage | Databases | SQL Server, PostgreSQL, MySQL |
| Storage | File Systems | Local and cloud-based file storage |
| Storage | Data Lakehouses | Combining data lakes and data warehouses |
Some key aspects:
- Authentication and Access Control
- Microsoft Entra ID: All interactions with Fabric are authenticated using Microsoft Entra ID, ensuring secure access from any device and network.
- Role-Based Access Control (RBAC): Access to data is managed based on user roles, ensuring that only authorized personnel can access sensitive data.
- Data Encryption
- Data in Transit: All data transferred within Fabric is encrypted by default, protecting it from interception during extraction.
- Data at Rest: Data stored in Fabric is automatically encrypted, ensuring it remains secure even when not in use.
- Network Security
- Private Links and Conditional Access: Fabric can use private links and conditional access policies to regulate and secure data access, especially for data behind firewalls or within private networks.
- Trusted Access: Fabric can securely connect to data sources protected by firewalls or private networks, ensuring data is not exposed to the public internet.
- Compliance and Governance
- Compliance Standards: Fabric supports a wide range of compliance standards, ensuring data security and regulatory compliance.
- Governance Tools: Features like data lineage, information protection labels, and data loss prevention help manage and secure data throughout its lifecycle.
- Automation and Monitoring
- Automated Security Protocols: Security protocols, including access controls and encryption, are automated to reduce human error and ensure consistent application.
- Threat Monitoring: Continuous monitoring for vulnerabilities and threats helps maintain a secure environment.