Skip to content

Home > Docs > Compliance > NIST 800-53

🛡️ NIST 800-53 Control Mapping for Microsoft Fabric

Federal Information Security Controls Mapped to Fabric Implementations

Framework Controls Last Updated


Last Updated: 2026-05-05 | Version: 1.0.0


📑 Table of Contents


🎯 Overview

NIST Special Publication 800-53 Revision 5 defines security and privacy controls for federal information systems. It is the foundational control catalog for FedRAMP, FISMA, and most US federal compliance programs. This guide maps the six most critical control families to Microsoft Fabric capabilities.

Applicability to Fabric

NIST 800-53 applies to any Microsoft Fabric deployment that:

  • Processes federal agency data (FISMA requirement)
  • Operates within a FedRAMP-authorized boundary
  • Is subject to agency-specific security requirements (DoD, IC, civilian)
  • Handles Controlled Unclassified Information (CUI) under NIST 800-171

Control Baseline Selection

Impact Level Typical Use Case Controls Required
Low Public data analytics, non-sensitive BI ~156 controls
Moderate Most federal workloads, CUI processing ~325 controls
High National security, law enforcement, PII at scale ~421 controls

Most Fabric deployments targeting federal use will operate at the Moderate baseline.


📊 Control Family Mappings

AC — Access Control

Control ID Control Name Fabric Implementation Evidence
AC-2 Account Management Entra ID user/group management; Fabric workspace roles (Admin, Member, Contributor, Viewer) Entra ID audit logs, workspace role assignments
AC-3 Access Enforcement Workspace RBAC, item-level permissions, row-level security (RLS) in semantic models, OneLake data access roles RBAC export, RLS policy definitions
AC-4 Information Flow Enforcement Sensitivity labels (MIP), DLP policies, Outbound Access Protection, managed private endpoints DLP policy reports, OAP configuration, label audit
AC-5 Separation of Duties Distinct workspace roles; separate Admin/Member/Contributor tiers; Purview policy separation Role assignment matrix, workspace membership list
AC-6 Least Privilege OneLake data access roles with granular folder/table permissions; item-level sharing controls Data access role definitions, sharing reports
AC-7 Unsuccessful Logon Attempts Entra ID Smart Lockout (configurable threshold and duration) Entra ID sign-in logs, lockout configuration
AC-11 Device Lock Conditional Access policies requiring compliant/managed devices Conditional Access policy export
AC-17 Remote Access Entra ID Conditional Access; private endpoints for Fabric; VPN/ExpressRoute for on-premises gateways Conditional Access policies, network configuration

AU — Audit and Accountability

Control ID Control Name Fabric Implementation Evidence
AU-2 Event Logging Fabric Admin audit logs (user activity, admin operations); SQL audit logs; Entra ID sign-in/audit logs Audit log configuration, log retention settings
AU-3 Content of Audit Records Fabric audit events include: user identity, timestamp, operation type, item name, workspace, result status Sample audit log entries showing required fields
AU-4 Audit Log Storage Capacity Azure Monitor Log Analytics workspace with configurable retention (30–730 days); archive to Storage Account Log Analytics retention config, archive policy
AU-6 Audit Record Review Power BI monitoring workspace; custom KQL dashboards in Eventhouse; SIEM integration (Microsoft Sentinel) Monitoring dashboard screenshots, Sentinel rules
AU-8 Time Stamps All Fabric audit events use UTC timestamps synchronized to Microsoft's NTP infrastructure Sample log entries with UTC timestamps
AU-9 Protection of Audit Information Audit logs stored in Microsoft-managed infrastructure; customer copies protected via Storage Account RBAC and immutability policies Storage immutability policy, RBAC on log storage
AU-11 Audit Record Retention Configurable retention in Log Analytics (up to 730 days); long-term archive to immutable blob storage Retention policy settings documentation
AU-12 Audit Record Generation Automatic audit event generation for all Fabric operations; SQL Database audit logging; Entra sign-in events Audit log sources configuration

CM — Configuration Management

Control ID Control Name Fabric Implementation Evidence
CM-2 Baseline Configuration Bicep/ARM templates for infrastructure deployment; fabric-cicd for Fabric item deployment; tenant settings baseline IaC templates in source control, tenant settings export
CM-3 Configuration Change Control GitHub Actions CI/CD pipeline with PR review gates; fabric-cicd deployment with approvals Git history, PR approval records, deployment logs
CM-5 Access Restrictions for Change Branch protection rules; deployment service principal with scoped permissions; admin-only tenant settings Branch protection config, SP role assignments
CM-6 Configuration Settings Tenant admin settings documented and version-controlled; workspace settings via API; Bicep parameter files Tenant settings export, parameter files in Git
CM-7 Least Functionality Disable unused Fabric experiences per workspace; restrict export formats; block external sharing unless required Tenant settings showing disabled features
CM-8 System Component Inventory Fabric Admin API for workspace/item inventory; OneLake Catalog for data asset discovery; Purview data map Admin API inventory export, Catalog screenshots

IA — Identification and Authentication

Control ID Control Name Fabric Implementation Evidence
IA-2 Identification and Authentication Entra ID authentication required for all Fabric access; MFA enforcement via Conditional Access Conditional Access policies requiring MFA
IA-2(1) MFA to Privileged Accounts Conditional Access policy requiring MFA for Fabric Admin and workspace Admin roles CA policy targeting privileged roles
IA-2(2) MFA to Non-Privileged Accounts Conditional Access policy requiring MFA for all Fabric users CA policy targeting all users
IA-4 Identifier Management Entra ID manages all user identifiers; service principals for automation; managed identities for Fabric workspaces Entra ID user/SP inventory
IA-5 Authenticator Management Entra ID password policies, FIDO2/passkey support, certificate-based auth, Authenticator app Authentication methods policy
IA-8 Identification and Authentication (Non-Org Users) Entra ID B2B guest access with MFA; external sharing controls in tenant settings B2B configuration, guest access policies

SC — System and Communications Protection

Control ID Control Name Fabric Implementation Evidence
SC-7 Boundary Protection Managed VNet for Fabric; private endpoints; Outbound Access Protection; IP firewall rules Network config, OAP settings, firewall rules
SC-8 Transmission Confidentiality TLS 1.2+ enforced for all Fabric communications; HTTPS-only access TLS configuration, network trace showing TLS version
SC-8(1) Cryptographic Protection TLS 1.2+ with strong cipher suites for data in transit SSL/TLS configuration audit
SC-12 Cryptographic Key Management Azure Key Vault for CMK; Microsoft-managed keys for platform encryption; automatic key rotation Key Vault audit logs, rotation policy
SC-13 Cryptographic Protection AES-256 encryption at rest (OneLake, SQL Database); TLS 1.2+ in transit; CMK option for SQL Database Encryption configuration, CMK status
SC-28 Protection of Information at Rest OneLake encryption at rest (Microsoft-managed); SQL Database TDE with CMK option; Storage Account SSE Encryption status reports
SC-28(1) Cryptographic Protection of Stored Information AES-256 for all data at rest; CMK via Azure Key Vault for SQL Database and Storage Account CMK configuration, Key Vault audit

SI — System and Information Integrity

Control ID Control Name Fabric Implementation Evidence
SI-2 Flaw Remediation Microsoft manages platform patching; Spark Runtime updates (customer-initiated migration); dependency scanning in CI/CD Spark runtime version, CI scan results
SI-3 Malicious Code Protection Microsoft Defender for Cloud integration; Fabric platform-level scanning; no customer-uploaded executables Defender for Cloud status
SI-4 System Monitoring Fabric Admin monitoring workspace; Azure Monitor integration; Microsoft Sentinel SIEM; KQL dashboards in Eventhouse Monitoring dashboard, Sentinel workbook
SI-5 Security Alerts and Advisories Microsoft Service Health notifications; Fabric release notes; Azure Advisor security recommendations Service Health subscription, Advisor findings
SI-7 Software and Information Integrity Git-based source control for notebooks/pipelines; fabric-cicd deployment with hash verification; Delta Lake ACID transactions Git commit history, Delta transaction logs
SI-12 Information Management and Retention Fabric retention policies; Data Lifecycle Management in Purview; configurable audit log retention Retention policy settings, Purview DLM config

🤝 Shared Responsibility Model

Control Area Microsoft Responsibility Customer Responsibility
Physical Security (PE) Full datacenter physical security, environmental controls N/A
Access Control (AC) Entra ID platform, MFA infrastructure, platform RBAC engine User provisioning, role assignments, RLS policies, least privilege enforcement
Audit (AU) Audit event generation, platform log infrastructure Log collection configuration, retention settings, SIEM integration, log review
Configuration (CM) Platform updates, runtime patching, infrastructure baseline Tenant settings configuration, IaC templates, CI/CD pipeline, change management
Authentication (IA) Entra ID infrastructure, MFA services, identity platform MFA policy enforcement, authentication method selection, guest access policies
Communications (SC) TLS enforcement, platform encryption, network backbone Private endpoint configuration, CMK setup, firewall rules, VNet integration
Integrity (SI) Platform patching, malware scanning, service health Runtime version management, CI/CD scanning, monitoring dashboard setup

⚠️ Gap Analysis and Limitations

Gap NIST Control Impact Compensating Control
OneLake does not support CMK SC-12, SC-28(1) Data at rest uses Microsoft-managed keys only for Lakehouse data Document MMK as acceptable per ATO; use CMK for SQL Database tier
No native SIEM in Fabric AU-6, SI-4 Audit log review requires external tooling Integrate with Microsoft Sentinel or third-party SIEM
Limited network segmentation within Fabric SC-7 Workspaces share tenant network boundary Use managed VNet, private endpoints, and OAP for isolation
Spark runtime patching is customer-initiated SI-2 Requires customer action to migrate to patched runtimes Establish runtime migration SOP; monitor for deprecation notices
No FIPS 140-2 validated encryption modules documented for Fabric SC-13 May not satisfy High baseline crypto requirements Request Microsoft attestation; use Azure Government for High workloads
Fabric not yet FedRAMP High authorized Multiple Limits use for High-impact federal systems Use Fabric in Azure Government when available; apply compensating controls
Audit log retention max 730 days in Log Analytics AU-11 Some agencies require longer retention Archive to immutable blob storage with lifecycle policies

✅ Implementation Checklist

  • AC-2/AC-3: Configure workspace RBAC with least privilege roles; document role assignment matrix
  • AC-4: Apply sensitivity labels to all workspaces and items; enable DLP policies
  • AC-6: Configure OneLake data access roles with folder-level granularity
  • AC-17: Deploy Conditional Access policies requiring MFA and compliant devices
  • AU-2/AU-12: Enable Fabric admin audit logging; configure SQL audit logs for all databases
  • AU-4/AU-11: Set Log Analytics retention to agency requirement (min 90 days); configure archive
  • AU-6: Deploy monitoring workspace or Sentinel workbook for audit log review
  • CM-2: Implement Bicep templates for all infrastructure; use fabric-cicd for item deployment
  • CM-3: Enforce PR review gates and branch protection in CI/CD pipeline
  • IA-2: Enable MFA for all users via Conditional Access; enforce for admin roles
  • SC-7: Configure managed VNet, private endpoints, and Outbound Access Protection
  • SC-12/SC-28: Enable CMK for SQL Database via Azure Key Vault; document MMK for OneLake
  • SI-2: Establish Spark runtime migration schedule; subscribe to deprecation notices
  • SI-4: Deploy monitoring dashboards; integrate Fabric audit logs with Sentinel
  • SI-7: Enable Git integration for all notebooks and pipelines; use fabric-cicd for deployments

📚 References

Internal Best-Practices

Guide Relevant Controls
Customer-Managed Keys SC-12, SC-13, SC-28
SQL Audit Logs Compliance AU-2, AU-3, AU-4, AU-6, AU-11
Identity & RBAC Patterns AC-2, AC-3, AC-5, AC-6, IA-2, IA-4
Network Security SC-7, SC-8, AC-17
Outbound Access Protection SC-7, AC-4
Monitoring & Observability AU-6, SI-4, SI-5
fabric-cicd Deployment CM-2, CM-3, CM-5, SI-7
Spark Runtime Migration SI-2
Data Governance Deep Dive AC-4, CM-8, SI-12

External References


This mapping is based on NIST 800-53 Rev. 5 and Microsoft Fabric capabilities as of May 2026. Validate against your agency's specific System Security Plan (SSP) requirements.