{"id":2827,"date":"2026-05-14T15:04:58","date_gmt":"2026-05-14T14:04:58","guid":{"rendered":"https:\/\/clouddirect.net\/learning-hub\/?p=2827"},"modified":"2026-05-14T15:17:25","modified_gmt":"2026-05-14T14:17:25","slug":"ai-security-governance-microsoft-fabric","status":"publish","type":"post","link":"https:\/\/clouddirect.net\/learning-hub\/ai-security-governance-microsoft-fabric\/","title":{"rendered":"Mind the\u00a0AI security gap:\u00a0Master\u00a0governance in Microsoft Fabric\u00a0"},"content":{"rendered":"\n<p>Written by <a href=\"https:\/\/www.linkedin.com\/in\/leongodwin\/\">Leon Godwin<\/a>, Principle Cloud Evangelist<\/p>\n\n<p>As organisations rapidly accelerate their AI adoption, the democratisation of data has become a massive competitive advantage. However, this broader access to data is also increasing&nbsp;your exposure to security incidents, insider threats, and uncontrolled data sharing. If left unmitigated, these risks can quickly undermine organisational trust and slow down your pace of innovation.&nbsp;<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-integrating-fabric-and-purview-to-close-the-gap\">Integrating Fabric and Purview to close the gap<\/h2>\n\n<p>Historically, data management was characterised by fragmented silos, which created an impressive governance gap.\u00a0You\u2019ve\u00a0likely heard\u00a0the reflection that \u201cAI is only as good as your\u00a0data\u201d.\u00a0If your underlying data estate is not secure, compliant, and governed, your AI initiatives will inevitably falter. According to a recent <a href=\"https:\/\/techcommunity.microsoft.com\/blog\/microsoft-security-blog\/new-microsoft-purview-innovations-for-fabric-to-safely-accelerate-your-ai-transf\/4502156\">Microsoft Security Blog<\/a>, a staggering 86% of organisations lack visibility into their AI data flows,\u00a0operating\u00a0completely in the dark\u00a0regarding\u00a0the specific information their employees are sharing with AI systems. Furthermore, 67% of executives\u00a0remain\u00a0uncomfortable utilising data for AI initiatives due to persistent quality and security concerns.\u00a0<\/p>\n\n<p>Today, Microsoft Fabric solves these systemic inefficiencies by unifying your data estate with a data&nbsp;moderisation&nbsp;platform.&nbsp;<\/p>\n\n<p>By integrating Microsoft Fabric with Microsoft Purview, organisations can finally close the AI security gap. This powerful combination allows data&nbsp;and AI&nbsp;leaders to enforce a &#8220;secure by default&#8221; environment, applying fine-grained access controls, mitigating insider risks, and preventing the oversharing of sensitive information in AI prompts.&nbsp;Ultimately, unified&nbsp;data governance is no longer just a regulatory checkbox. Data governance is now the&nbsp;key ingredient to innovation without&nbsp;compromising on&nbsp;security.&nbsp;<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-data-governance-implementation\">Data governance implementation<\/h2>\n\n<p>To successfully implement this unified data governance strategy, organisations must move beyond theory and&nbsp;leverage&nbsp;the native capabilities built into Microsoft Fabric and Microsoft Purview. Here are the concrete features and operational steps you should prioritise:&nbsp;<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Universal&nbsp;OneLake&nbsp;Security:<\/strong>&nbsp;Transition away from configuring security in every individual AI model or report. Fabric&#8217;s&nbsp;OneLake&nbsp;allows you to configure Object-Level Security (OLS), Row-Level Security (RLS), and Column-Level Security (CLS) directly at the data source. This &#8220;define once, enforce everywhere&#8221; approach ensures that however a user sends a query the exact same permissions apply natively.&nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li><strong>Data Loss Prevention (DLP) and Sensitivity Labels:<\/strong>&nbsp;Deep integration with Microsoft Purview allows you to apply sensitivity labels&nbsp;that persist as data flows from the&nbsp;lakehouse&nbsp;all the way down to exported Office files. Fabric also supports DLP policies that can automatically detect sensitive data, trigger policy tips, and restrict access to structured data in warehouses and databases to prevent data oversharing.&nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li><strong>Federated Governance via Domains:<\/strong>&nbsp;Avoid the bottleneck of a strictly centralised IT team by grouping your data into logical &#8220;Domains&#8221; (e.g., Finance, HR, Marketing). This allows you to delegate domain-specific governance and administration to the respective business units while still&nbsp;maintaining&nbsp;tenant-wide security guardrails.&nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li><strong>Insider Risk Management (IRM):<\/strong>&nbsp;Protect your intellectual property by leveraging IRM indicators for Fabric. These tools&nbsp;monitor&nbsp;user activity within the Lakehouse to detect and alert you to risky behaviours, such as the mass exporting of sensitive reports or potential data exfiltration.&nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li><strong>Lineage, Impact Analysis, and Endorsement:<\/strong>&nbsp;Establish&nbsp;trust in your data estate. Fabric provides visual data lineage to track the flow of data from source to destination, helping you&nbsp;answer&nbsp;&#8220;what breaks if I change this data?&#8221;. Pair this with the &#8220;Endorsement&#8221; feature to clearly label trustworthy, certified data items, guiding business users to the right source of truth.&nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li><strong>Network Security:<\/strong>&nbsp;Move beyond public internet access. Secure your environment by implementing Private Links to ensure traffic between your infrastructure and Fabric routes over the secure Microsoft global&nbsp;network, and&nbsp;utilise customer-managed keys to encrypt sensitive data at rest.&nbsp;<\/li>\n<\/ul>\n\n<p>Ultimately, Microsoft&nbsp;Fabric&nbsp;represents&nbsp;a significant shift in the data platform landscape, offering the potential to&nbsp;eliminate&nbsp;data sprawl and simplify governance. However, simply having access to these native capabilities is not enough. Transitioning to this unified environment requires a commitment to &#8220;governance by design&#8221; by treating security, compliance, and quality as foundational elements rather than afterthoughts. From automated access restrictions in&nbsp;OneLake&nbsp;to advanced insider risk detection, Microsoft Fabric and Purview work together to ensure that protection is built-in, consistent, and end-to-end. The true challenge for organisations lies in execution.&nbsp;Start by&nbsp;establishing&nbsp;the right strategic frameworks, a data culture, and planning a phased rollout that balances speed with architectural rigour.&nbsp;<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-next-steps-join-our-webinar\">\u202fNext Steps: Join our webinar<\/h3>\n\n<p>To help you navigate these challenges and confidently adopt Microsoft Fabric, I am thrilled to announce that I will be co-hosting an exclusive 60-minute&nbsp;webinar&nbsp;alongside Rana Kamel, Cloud and Data Solution Architect at Microsoft.&nbsp;<\/p>\n\n<p>Event Details:&nbsp;<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Webinar: Mastering Security &amp; Governance in Microsoft Fabric&nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>Date: Wednesday, 10th June 2026&nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>Time: 10:00 &#8211; 11:00 (Online)&nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>Speakers: Rana Kamel (Microsoft) &amp; Leon Godwin (Cloud Direct)&nbsp;<\/li>\n<\/ul>\n\n<p>Don\u2019t&nbsp;let security concerns hold back your AI and data transformation.&nbsp;<a href=\"https:\/\/clouddirect.net\/events\/mastering-security-governance-in-microsoft-fabric\/\">Sign-up today<\/a> to save the date in your diary.&nbsp;&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Written by Leon Godwin, Principle Cloud Evangelist As organisations rapidly accelerate their AI adoption, the democratisation of data has become a massive competitive advantage. However, this broader access to data is also increasing&nbsp;your exposure to security incidents, insider threats, and uncontrolled data sharing. If left unmitigated, these risks can quickly undermine organisational trust and slow [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":2973,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[55],"tags":[113,112,61,71,60,66],"post_media_type":[24],"class_list":["post-2827","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-fabric","tag-ai-governance","tag-ai-security","tag-fabric","tag-governance","tag-microsoft-fabric","tag-microsoft-security","post_media_type-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Mind the AI Security Gap: Governance in Microsoft Fabric<\/title>\n<meta name=\"description\" content=\"How to close the AI security gap using Microsoft Fabric and Purview with secure-by-design governance and data protection best practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clouddirect.net\/learning-hub\/ai-security-governance-microsoft-fabric\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mind the\u00a0AI security gap:\u00a0Master\u00a0governance in Microsoft Fabric\u00a0\" \/>\n<meta property=\"og:description\" content=\"How to close the AI security gap using Microsoft Fabric and Purview with secure-by-design governance and data protection best practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/clouddirect.net\/learning-hub\/ai-security-governance-microsoft-fabric\/\" \/>\n<meta property=\"og:site_name\" content=\"Learning Hub\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-14T14:04:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-14T14:17:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2026\/05\/Mind-the-AI-Security-Gap-Header.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"abbieantoine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"abbieantoine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/ai-security-governance-microsoft-fabric\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/ai-security-governance-microsoft-fabric\\\/\"},\"author\":{\"name\":\"abbieantoine\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#\\\/schema\\\/person\\\/74dbe97225c05374d42d142cdc1d2a28\"},\"headline\":\"Mind the\u00a0AI security gap:\u00a0Master\u00a0governance in Microsoft Fabric\u00a0\",\"datePublished\":\"2026-05-14T14:04:58+00:00\",\"dateModified\":\"2026-05-14T14:17:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/ai-security-governance-microsoft-fabric\\\/\"},\"wordCount\":872,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/ai-security-governance-microsoft-fabric\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/05\\\/Mind-the-AI-Security-Gap-Header.png\",\"keywords\":[\"ai governance\",\"AI security\",\"Fabric\",\"Governance\",\"Microsoft Fabric\",\"Microsoft Security\"],\"articleSection\":[\"Microsoft Fabric\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/ai-security-governance-microsoft-fabric\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/ai-security-governance-microsoft-fabric\\\/\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/ai-security-governance-microsoft-fabric\\\/\",\"name\":\"Mind the AI Security Gap: Governance in Microsoft Fabric\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/ai-security-governance-microsoft-fabric\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/ai-security-governance-microsoft-fabric\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/05\\\/Mind-the-AI-Security-Gap-Header.png\",\"datePublished\":\"2026-05-14T14:04:58+00:00\",\"dateModified\":\"2026-05-14T14:17:25+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#\\\/schema\\\/person\\\/74dbe97225c05374d42d142cdc1d2a28\"},\"description\":\"How to close the AI security gap using Microsoft Fabric and Purview with secure-by-design governance and data protection best practices.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/ai-security-governance-microsoft-fabric\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/ai-security-governance-microsoft-fabric\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/ai-security-governance-microsoft-fabric\\\/#primaryimage\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/05\\\/Mind-the-AI-Security-Gap-Header.png\",\"contentUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/05\\\/Mind-the-AI-Security-Gap-Header.png\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/ai-security-governance-microsoft-fabric\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mind the\u00a0AI security gap:\u00a0Master\u00a0governance in Microsoft Fabric\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#website\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/\",\"name\":\"Learning Hub\",\"description\":\"Cloud Direct\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#\\\/schema\\\/person\\\/74dbe97225c05374d42d142cdc1d2a28\",\"name\":\"abbieantoine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g\",\"caption\":\"abbieantoine\"},\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/author\\\/abbiefawcett\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Mind the AI Security Gap: Governance in Microsoft Fabric","description":"How to close the AI security gap using Microsoft Fabric and Purview with secure-by-design governance and data protection best practices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clouddirect.net\/learning-hub\/ai-security-governance-microsoft-fabric\/","og_locale":"en_GB","og_type":"article","og_title":"Mind the\u00a0AI security gap:\u00a0Master\u00a0governance in Microsoft Fabric\u00a0","og_description":"How to close the AI security gap using Microsoft Fabric and Purview with secure-by-design governance and data protection best practices.","og_url":"https:\/\/clouddirect.net\/learning-hub\/ai-security-governance-microsoft-fabric\/","og_site_name":"Learning Hub","article_published_time":"2026-05-14T14:04:58+00:00","article_modified_time":"2026-05-14T14:17:25+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2026\/05\/Mind-the-AI-Security-Gap-Header.png","type":"image\/png"}],"author":"abbieantoine","twitter_card":"summary_large_image","twitter_misc":{"Written by":"abbieantoine","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/clouddirect.net\/learning-hub\/ai-security-governance-microsoft-fabric\/#article","isPartOf":{"@id":"https:\/\/clouddirect.net\/learning-hub\/ai-security-governance-microsoft-fabric\/"},"author":{"name":"abbieantoine","@id":"https:\/\/clouddirect.net\/learning-hub\/#\/schema\/person\/74dbe97225c05374d42d142cdc1d2a28"},"headline":"Mind the\u00a0AI security gap:\u00a0Master\u00a0governance in Microsoft Fabric\u00a0","datePublished":"2026-05-14T14:04:58+00:00","dateModified":"2026-05-14T14:17:25+00:00","mainEntityOfPage":{"@id":"https:\/\/clouddirect.net\/learning-hub\/ai-security-governance-microsoft-fabric\/"},"wordCount":872,"commentCount":0,"image":{"@id":"https:\/\/clouddirect.net\/learning-hub\/ai-security-governance-microsoft-fabric\/#primaryimage"},"thumbnailUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2026\/05\/Mind-the-AI-Security-Gap-Header.png","keywords":["ai governance","AI security","Fabric","Governance","Microsoft Fabric","Microsoft Security"],"articleSection":["Microsoft Fabric"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/clouddirect.net\/learning-hub\/ai-security-governance-microsoft-fabric\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/clouddirect.net\/learning-hub\/ai-security-governance-microsoft-fabric\/","url":"https:\/\/clouddirect.net\/learning-hub\/ai-security-governance-microsoft-fabric\/","name":"Mind the AI Security Gap: Governance in Microsoft Fabric","isPartOf":{"@id":"https:\/\/clouddirect.net\/learning-hub\/#website"},"primaryImageOfPage":{"@id":"https:\/\/clouddirect.net\/learning-hub\/ai-security-governance-microsoft-fabric\/#primaryimage"},"image":{"@id":"https:\/\/clouddirect.net\/learning-hub\/ai-security-governance-microsoft-fabric\/#primaryimage"},"thumbnailUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2026\/05\/Mind-the-AI-Security-Gap-Header.png","datePublished":"2026-05-14T14:04:58+00:00","dateModified":"2026-05-14T14:17:25+00:00","author":{"@id":"https:\/\/clouddirect.net\/learning-hub\/#\/schema\/person\/74dbe97225c05374d42d142cdc1d2a28"},"description":"How to close the AI security gap using Microsoft Fabric and Purview with secure-by-design governance and data protection best practices.","breadcrumb":{"@id":"https:\/\/clouddirect.net\/learning-hub\/ai-security-governance-microsoft-fabric\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clouddirect.net\/learning-hub\/ai-security-governance-microsoft-fabric\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/clouddirect.net\/learning-hub\/ai-security-governance-microsoft-fabric\/#primaryimage","url":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2026\/05\/Mind-the-AI-Security-Gap-Header.png","contentUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2026\/05\/Mind-the-AI-Security-Gap-Header.png","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/clouddirect.net\/learning-hub\/ai-security-governance-microsoft-fabric\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clouddirect.net\/learning-hub\/"},{"@type":"ListItem","position":2,"name":"Mind the\u00a0AI security gap:\u00a0Master\u00a0governance in Microsoft Fabric\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/clouddirect.net\/learning-hub\/#website","url":"https:\/\/clouddirect.net\/learning-hub\/","name":"Learning Hub","description":"Cloud Direct","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clouddirect.net\/learning-hub\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/clouddirect.net\/learning-hub\/#\/schema\/person\/74dbe97225c05374d42d142cdc1d2a28","name":"abbieantoine","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g","caption":"abbieantoine"},"url":"https:\/\/clouddirect.net\/learning-hub\/author\/abbiefawcett\/"}]}},"_links":{"self":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/2827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/comments?post=2827"}],"version-history":[{"count":10,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/2827\/revisions"}],"predecessor-version":[{"id":2982,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/2827\/revisions\/2982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/media\/2973"}],"wp:attachment":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/media?parent=2827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/categories?post=2827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/tags?post=2827"},{"taxonomy":"post_media_type","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/post_media_type?post=2827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}