Skip to main content

Open Data Governance Standard — Universal Validation Primitive

Project description

Open Data Governance Standard (ODGS)

Protocol Compliance DOI PyPI Downloads npm Downloads License

The Universal Validation Engine for High-Risk Data.


[!IMPORTANT] EU AI Act & NEN 381 525 Compliance Notice (v4.0.0) This Universal Engine enforces Administrative Recusal ("Hard Stop") for High-Risk AI.

  • Standardization: Candidate Reference Implementation for CEN/CENELEC JTC 21/25.
  • Enforcement: Strictly decouples statutory Law Packs (urn:odgs:sov:*) from local logic.

🏛️ Standards Refactor: Universal Engine Architecture (v4.0.0)

Notice to all Data Engineers and Architects: The repository structure has been formally reorganized to align with the structural directives of the Royal Netherlands Standardization Institute (NEN) and reflects the federated data sovereignty principles championed by leading European applied science institutes (e.g., TNO).

To strictly enforce the semantic decoupling of policy from execution, all materials are now divided into:

  1. 1_NORMATIVE_SPECIFICATION/: Mandatory cryptographic schemas, rules, and W3C OWL ontologies.
  2. 2_INFORMATIVE_REFERENCE/: The software implementation (odgs universal engine), adapters, and documentation.

1. The Standard: Data Governance Without Compromise

The Open Data Governance Standard (ODGS) is a vendor-neutral protocol for Universal Data Governance. It resolves the "Definition-Execution Gap" in data pipelines by creating a deterministic method for Administrative Recusal ("Hard Stop").

"Silence over Error." — The Core Philosophy. If data drifts from its legal, contractual, or internal definition, the pipeline must mathematically halt rather than process an invalid inference.

ODGS parses any text-based agreement into mechanical constraints via Draft-7 JSON Schemas, verifying identities via JWKS cryptography, and outputting mathematically pure, vendor-neutral audit logs.

See It In Action → demo.metricprovenance.com

Semantic Certificate — Every sovereign definition carries a cryptographic fingerprint bound to its issuing authority. The data equivalent of a TLS certificate.

Semantic Certificate — cryptographic fingerprint bound to the Government of the Netherlands, with VALID status badge and SHA-256 content hash

📊 More Screenshots — Compliance Matrix · Sovereign Brake · Harvester Sources

Sovereign Compliance Matrix — Real-time governance status across 72 business metrics, aligned with EU AI Act Art. 10 & 12.

Sovereign Compliance Matrix showing 72 business metrics, domain filters, and Naked vs Sovereign status

Sovereign Brake — Live Interceptor — When data does not match its statutory definition, the system refuses to proceed. This is the "Administrative Recusal" principle.

Sovereign Brake showing HARD_STOP enforcement rules with regex validation

Sovereign Harvester — Authoritative Sources — Definitions harvested from trusted regulatory bodies and international standards organisations.

Harvester Sources showing Dutch Administrative Law, FIBO, ISO 42001, and GDPR with live API status


2. Quick Start: The Data Engineer Workflow

Stop relying on generic analytics failures. Enforce your SLAs, SOC2 policies, and data quality checks directly in your Python transforms.

Install

pip install odgs==4.0.1

Example: Halting a Pipeline in Python/dbt

Inject ODGS directly into your data warehouse transforms, Airflow DAGs, or Databricks PySpark wrappers:

from odgs.executive.interceptor import OdgsInterceptor
from odgs.executive.exceptions import ProcessBlockedException

engine = OdgsInterceptor()

# The payload (e.g., a row from pandas or a dbt pre-hook validation)
payload = {"transaction_value": 150000, "aml_flag": False}

try:
    # Evaluate against your internal threshold rules
    engine.intercept("urn:odgs:custom:aml-check", payload)
    print("Payload Validated. Proceeding with database insert.")
    
except ProcessBlockedException as e:
    # The pipeline HALTS before bad data is merged or a model is trained
    print(f"PIPELINE HALTED: {e}")

3. The Ecosystem: URN Namespace Routing

ODGS v4.0.0 routes logic based on Uniform Resource Names (URNs).

🟢 Free & Internal (urn:odgs:custom:*)

Completely free, offline namespaces for your internal developer usage (Data Quality, B2B SLAs, SOC2 limits, ETL checks).

  • Routing: Automatically loads from your local workspace (./schemas/custom/).
  • Execution: 100% free, local, with agnostic audit logging.

🔵 The Sovereign Tier (urn:odgs:sov:*)

Premium Sovereign configurations (EU AI Act, GDPR, DORA) cryptographically signed by the Metric Provenance Root Authority.

  • Routing: Enforces the Sovereign Handshake and loads statutory packs from secure enterprise mounts (/etc/odgs/law-packs/).
  • Liability: Provides immediate cryptographic proof and legal indemnity that your pipeline mathematically bounds its execution within the exact letter of the law.

4. Extensibility: Bring Your Own Architecture

We built ODGS to be the "Linux of Data Governance". It injects anywhere.

ODGS implements a "Constitutional Stack" where mechanical execution is legally bound by semantic definitions via the Universal Interceptor.

graph TD
    subgraph "The Constitution (Policy)"
        L[1. Governance] -->|Defines Intent| Leg[2. Legislative]
        Leg -->|Defines Metrics| Jud[3. Judiciary]
    end
    subgraph "The Machine (Execution)"
        Jud -->|Enforces Rules| Ex[4. Executive]
        Ex -->|Contextualizes| Phy[5. Physical]
    end
    subgraph "The Audit Trail"
        Phy -->|Logs Evidence| Anchor[Trust Anchor]
    end
    style L fill:#f9f,stroke:#333,stroke-width:2px
    style Leg fill:#bbf,stroke:#333,stroke-width:2px
    style Jud fill:#bfb,stroke:#333,stroke-width:2px
    style Ex fill:#ddd,stroke:#333,stroke-width:2px
    style Phy fill:#ddd,stroke:#333,stroke-width:2px

🏭 The HarvesterFactory (Bring Your Own Blueprints)

You don't just have to use our Law Packs. Your internal teams or engineering partners (e.g., Deloitte, Capgemini) can write custom Python blueprints to automatically harvest and serialize your proprietary PDF contracts, API specifications, or Notion pages into executable ODGS JSON rule schemas.

🔌 The AdapterRegistry (Bring Your Own Integrations)

ODGS is headless. Using the AdapterRegistry, you can inject custom Python hooks to serialize rule execution plans back and forth to your proprietary systems (e.g., Rust backends, Kafka streams, Databricks clusters) without waiting for us to build the integration.

Read the Adapter Guide →


🌐 Platform Bridges

ODGS bridges connect your existing data governance platform to the Universal Interceptor, transforming passive data dictionaries into active runtime enforcement.

Bridge Source Output Status
odgs-collibra-bridge Collibra Business Glossary ODGS JSON Schemas In Development
odgs-databricks-bridge Databricks Unity Catalog ODGS JSON Schemas Planned
odgs-snowflake-bridge Snowflake Data Dictionary ODGS JSON Schemas Planned

Want to build a bridge? ODGS is designed to be the enforcement layer for any data governance platform. Open an issue or submit a PR.


5. Air-Gapped Execution & Stateless Cryptography (JWKS)

The ODGS Universal Engine operates with Zero Telemetry and does not "phone home". It is designed for strict air-gapped enterprise environments.

To ensure metric authenticity without requiring active network connections to a central database, ODGS implements stateless cryptography using standard Ed25519 JWKS (JSON Web Key Set) public keys.

  • Stateless Verification: When the Engine loads a Configuration Pack (e.g., EU AI Act, FIBO), it cryptographically verifies the signature against the cached JWKS public key. If the signature is valid, the engine guarantees the rules are authentic and untampered.
  • 100% Neutral & Decentralized: Organizations can seamlessly host their own internal JWKS registries for proprietary, internal rules (urn:odgs:custom:*). The Metric Provenance Root Authority is relied upon solely for statutory Sovereign URNs (urn:odgs:sov:*), ensuring the protocol remains fundamentally decentralized.

6. Audit Ledgers: Cryptographic Verifiability & Zero-Knowledge

ODGS outputs an agnostic cryptographic_attestation JSON schema to satisfy EU AI Act Article 12 (Forensic Logging) without exposing third-party data.

  • Git-as-Backend: ODGS utilizes a privacy-native logging architecture. Forensic logs are written directly to your private enterprise Git repository. Zero data ever leaves your perimeter.
  • The Tri-Partite Hash: The engine generates a cryptographic proof binding the Input Data Hash + Rule Definition Hash + Engine Configuration Hash. Independent auditors and regulatory bodies can mechanically verify the integrity of algorithmic decisions without exposing PII.

7. Enterprise Deployment (Kubernetes / Helm)

For organization-wide policy enforcement, Sovereign Nodes can deploy ODGS as an active sidecar container routing mesh traffic.

# Add the Official Metric Provenance Repository
helm repo add metricprovenance https://charts.metricprovenance.com
helm repo update

# Install the Engine
helm install odgs-cluster-agent metricprovenance/odgs-engine \
  --set configuration.namespace="urn:odgs:sov" \
  --set keys.jwks_url="https://platform.metricprovenance.com/.well-known/jwks.json"

To request architectural clearance for your organization's compliance deployment, please consult the Metric Provenance Enterprise Portal.


8. Documentation & Contribution

📚 Full Documentation Map → 🎯 Live Demo →

Guide Description
Migration Guide (v3.3 -> v4.0) Critical instructions for upgrading to URN Namespace Routing.
Adapter Guide For Data Engineers connecting ODGS to custom infrastructures.
Harvester Guide For implementing dynamic parsing blueprints.
Audit Ledger Guide For Big 4 Auditors verifying the Tri-Partite Hash.

Support & Community

  • Bug Reports & Feature Requests: Please use the GitHub Issues tracker.
  • Enterprise Compliance Deployments: For architectural clearance, SLA support, or custom Law Packs, please contact us via the Enterprise Portal.

License

Released under the Apache 2.0 License.

  • No Vendor Lock-in.
  • No Cloud Dependency.
  • 100% Data Sovereignty.

ODGS | Developed by Metric Provenance | The Hague, NL 🇳🇱

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

odgs-4.0.1.tar.gz (415.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

odgs-4.0.1-py3-none-any.whl (189.4 kB view details)

Uploaded Python 3

File details

Details for the file odgs-4.0.1.tar.gz.

File metadata

  • Download URL: odgs-4.0.1.tar.gz
  • Upload date:
  • Size: 415.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.9

File hashes

Hashes for odgs-4.0.1.tar.gz
Algorithm Hash digest
SHA256 f17ad5978bf0caa6f280e7ad9a365d18c3d9be0298e7dde12111316212092d0e
MD5 9cc0ab30ad87b258ab5f051cad8f1ce5
BLAKE2b-256 98b5424178ff6ce8ca00c43d448099ebdc687e4856c92e03d571f97181161b87

See more details on using hashes here.

File details

Details for the file odgs-4.0.1-py3-none-any.whl.

File metadata

  • Download URL: odgs-4.0.1-py3-none-any.whl
  • Upload date:
  • Size: 189.4 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.9

File hashes

Hashes for odgs-4.0.1-py3-none-any.whl
Algorithm Hash digest
SHA256 4456b3d4b521e3315664798bc90c7a15b246fe7ecd8694ff9853bff3656573a6
MD5 6c9f370c77b5f723ad99647c3bae45b4
BLAKE2b-256 5abe920ad738c0501d863bea57933cdd5c84bf4bd5d8c117f9bfb544b999c003

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page