IntelliFabric
FeaturesGovernance & Security
Governance & Security

Enterprise-grade security. Zero trust from day one.

IntelliFabric is built on Microsoft Fabric's enterprise security model — data stays in your tenant, access is controlled by role, and every action is logged. Your compliance team will sleep better.

Data sovereignty — all data remains within your Azure subscription and geographic region
Row-level security — defined once in semantic model, inherited by all downstream reports
Microsoft Entra ID SSO — no separate credential system, MFA enforced by your policies
Data stays in your Azure tenant100%
Row-level security on every datasetRLS
Audit trail for all data accessFull
Live on Microsoft Fabric
100%
Data stays in your Azure tenant
RLS
Row-level security on every dataset
Full
Audit trail for all data access
The Problem

Most BI tools create security gaps at the data layer.

When data moves to a third-party SaaS platform for analysis, it leaves your governance perimeter. When analysts share dashboards via email attachments, row-level security is bypassed. When multiple teams build separate reports, each report carries its own access model — creating a patchwork that's impossible to audit. The result: compliance risk that's invisible until it's a problem.

The Solution

Security built into the platform architecture — not bolted on after.

IntelliFabric's security model is structural. Data lives in your Azure tenant. Row-level security is defined once in the semantic model and applies to every downstream report automatically. Access is managed through your existing Microsoft Entra ID groups. Every query is logged. Nothing bypasses the governance layer.

From connection to insight in four steps.

1

Data never leaves your Azure tenant

All data is stored in OneLake within your Azure subscription. IntelliFabric's pipelines run in your Fabric workspace. Folio3's team accesses your environment via JIT (just-in-time) access during implementation — not by having a copy of your data.

2

Row-level security defined once

RLS rules are configured in the semantic model using your Microsoft Entra ID groups or custom attribute tables. A finance controller sees all entities. A regional manager sees their region. A line supervisor sees their line. One configuration. All reports.

3

Microsoft Entra ID for authentication

All users authenticate via your existing Microsoft Entra ID (Azure AD). No new identity system. No separate username and password. Single sign-on with MFA enforced by your existing Entra ID policies.

4

Audit trail for all access

Microsoft Fabric's audit logging captures every query, every report view, every data export. Logs flow to your Azure Monitor or Sentinel workspace. Compliance teams can produce evidence of who accessed what data, when, from where.

What's included.

Data sovereignty — all data remains within your Azure subscription and geographic region
Row-level security — defined once in semantic model, inherited by all downstream reports
Microsoft Entra ID SSO — no separate credential system, MFA enforced by your policies
Full audit trail — all queries, views, and exports logged to Azure Monitor
IP-restricted access — Fabric workspace can be scoped to your corporate network or VPN
Compliance coverage: SOC 2 Type II, ISO 27001, HIPAA BAA (Microsoft Fabric certifications)

Under the hood.

01
Data residency
Your Azure subscription + region
02
Authentication
Microsoft Entra ID (SSO + MFA)
03
Access control
RLS in semantic model + Fabric workspace roles
04
Audit logging
Microsoft Fabric audit + Azure Monitor
05
Compliance
SOC 2, ISO 27001, HIPAA BAA
06
Network controls
Private endpoints + IP allowlisting supported
Get Started in 4–6 Weeks

See Governance & Security working against
your actual data.

Book a 45-minute live demo. We'll show you exactly what this feature delivers for your industry and data environment.

Book a Free Demo ← All Features