Fluid Forge
Get Started
See it run
  • Local (DuckDB)
  • Source-Aligned (Postgres → DuckDB)
  • AI Forge + Data Models
  • GCP (BigQuery)
  • Snowflake Team Collaboration
  • Declarative Airflow
  • Orchestration Export
  • Jenkins CI/CD
  • Universal Pipeline
  • 11-Stage Production Pipeline
  • Catalog Forge End-to-End
CLI Reference
  • Overview
  • Quickstart
  • Examples
  • Your own CI
  • Your own scaffolding
  • Custom validator
  • Apply hook
  • Reference
Demos
  • Overview
  • Architecture
  • GCP (BigQuery)
  • AWS (S3 + Athena)
  • Snowflake
  • Local (DuckDB)
  • Custom Providers
  • Roadmap
GitHub
GitHub
Get Started
See it run
  • Local (DuckDB)
  • Source-Aligned (Postgres → DuckDB)
  • AI Forge + Data Models
  • GCP (BigQuery)
  • Snowflake Team Collaboration
  • Declarative Airflow
  • Orchestration Export
  • Jenkins CI/CD
  • Universal Pipeline
  • 11-Stage Production Pipeline
  • Catalog Forge End-to-End
CLI Reference
  • Overview
  • Quickstart
  • Examples
  • Your own CI
  • Your own scaffolding
  • Custom validator
  • Apply hook
  • Reference
Demos
  • Overview
  • Architecture
  • GCP (BigQuery)
  • AWS (S3 + Athena)
  • Snowflake
  • Local (DuckDB)
  • Custom Providers
  • Roadmap
GitHub
GitHub
  • Introduction

    • Home
    • Getting Started
    • Snowflake Quickstart
    • See it run
    • Forge Data Model
    • Vision & Roadmap
    • Playground
    • FAQ
  • Concepts

    • Concepts
    • Builds, Exposes, Bindings
    • What is a contract?
    • Quality, SLAs & Lineage
    • Governance & Policy
    • Agent Policy (LLM/AI governance)
    • Providers vs Platforms
    • Fluid Forge vs alternatives
  • Data Products

    • Product Types — SDP, ADP, CDP
  • Walkthroughs

    • Walkthrough: Local Development
    • Source-Aligned: Postgres → DuckDB → Parquet
    • AI Forge And Data-Model Journeys
    • Walkthrough: Deploy to Google Cloud Platform
    • Walkthrough: Snowflake Team Collaboration
    • Declarative Airflow DAG Generation - The FLUID Way
    • Generating Orchestration Code from Contracts
    • Jenkins CI/CD for FLUID Data Products
    • Universal Pipeline
    • The 11-Stage Pipeline
    • End-to-End Walkthrough: Catalog → Contract → Transformation
  • CLI Reference

    • CLI Reference
    • fluid init
    • fluid demo
    • fluid forge
    • fluid skills
    • fluid status
    • fluid validate
    • fluid plan
    • fluid apply
    • fluid generate
    • fluid generate artifacts
    • fluid validate-artifacts
    • fluid verify-signature
    • fluid generate-airflow
    • fluid generate-pipeline
    • fluid viz-graph
    • fluid odps
    • fluid odps-bitol
    • fluid odcs
    • fluid export
    • fluid export-opds
    • fluid publish
    • fluid datamesh-manager
    • fluid market
    • fluid import
    • fluid policy
    • fluid policy check
    • fluid policy compile
    • fluid policy apply
    • fluid contract-tests
    • fluid contract-validation
    • fluid diff
    • fluid test
    • fluid verify
    • fluid product-new
    • fluid product-add
    • fluid workspace
    • fluid ide
    • fluid ai
    • fluid memory
    • fluid mcp
    • fluid scaffold-ci
    • fluid scaffold-composer
    • fluid scaffold-ide
    • fluid docs
    • fluid config
    • fluid split
    • fluid bundle
    • fluid auth
    • fluid doctor
    • fluid providers
    • fluid provider-init
    • fluid roadmap
    • fluid version
    • fluid runs
    • fluid retention
    • fluid secrets
    • fluid stats
    • fluid contract
    • fluid ship
    • fluid rollback
    • fluid schedule-sync
    • Catalog adapters

      • Source Catalog Integration (V1.5)
      • BigQuery Catalog
      • Snowflake Horizon Catalog
      • Databricks Unity Catalog
      • Google Dataplex Catalog
      • AWS Glue Data Catalog
      • DataHub Catalog
      • Data Mesh Manager Catalog
    • CLI by task

      • CLI by task
      • Add quality rules
      • Add agent governance
      • Debug a failed pipeline run
      • Switch clouds with one line
  • Recipes

    • Recipes
    • Recipe — add a quality rule
    • Recipe — switch clouds with one line
    • Recipe — tag PII in your schema
  • SDK & Plugins

    • SDK & Plugins
    • Quickstart — your first plugin
    • Examples

      • Runnable examples
      • Example: hello-scaffold — the minimal viable plugin
      • Example: gitlab-ci-scaffold — generate a complete CI project
      • Example: steward-validator — a custom governance rule
      • Example: prod-key-guard — apply-time invariant check
    • Journeys

      • Journeys
      • Your own CI/CD

        • You have your own CI/CD setup, no problem
        • GitLab CI — the bundle template
        • GitHub Actions — the bundle template
        • Jenkins — the bundle template
        • CircleCI — the bundle template
      • You have a strict project layout, no problem
      • You have governance rules, no problem
      • You want a check at apply time, no problem
    • Reference

      • Reference
      • Roles reference
      • Entry points reference
      • Trust model
      • Packaging
      • Companion packages
  • Providers

    • Providers
    • Provider Architecture
    • GCP Provider
    • AWS Provider
    • Snowflake Provider
    • Local Provider
    • Creating Custom Providers
    • Provider Roadmap
  • Advanced

    • Blueprints
    • Governance & Compliance
    • Airflow Integration
    • Built-in And Custom Forge Guidance
    • FLUID Forge Contract GPT Packet
    • Forge Discovery Guide
    • Forge Memory Guide
    • LLM Providers
    • Capability Warnings
    • LiteLLM Backend (opt-in)
    • MCP Server
    • Credential Resolver — Security Model
    • Cost Tracking
    • Agentic Primitives
    • Typed Errors
    • Typed CLI Errors
    • Authoring Forge Tools
    • Source-Aligned Acquisition
    • API Stability — fluid_build.api
    • Guided fluid forge UX
    • V1.5 Catalog Integration — Architecture Deep-Dive
    • V1.5 + V2 Hardening — Release Notes
  • Project

    • Contributing to Fluid Forge
    • Fluid Forge Docs Baseline: CLI 0.8.3
    • Fluid Forge Docs Baseline: CLI 0.8.0
    • Fluid Forge Docs Baseline: CLI 0.7.11
    • Fluid Forge Docs Baseline: CLI 0.7.9
    • Fluid Forge v0.7.1 - Multi-Provider Export Release

Governance & Policy

Three pieces, all declarative, all enforced before deploy:

  1. accessPolicy.grants[] — who can do what (the schema's permissions enum supports read, select, query, write, insert, update, delete, admin, and more). Top-level field.
  2. Column-level sensitivity — tag fields as pii, phi, etc. Triggers auto-masking on platforms that support it (BigQuery dynamic data masking, Snowflake masking policies).
  3. sovereignty — jurisdiction + region constraints. Top-level field.

All three round-trip through fluid policy-check → fluid policy-apply (see CLI reference for the exact options each command supports).

accessPolicy.grants[]

accessPolicy:
  grants:
    - principal: "group:analysts@company.com"
      permissions: ["read"]
    - principal: "group:data-engineering@company.com"
      permissions: ["read", "write", "admin"]
    - principal: "serviceAccount:bi-tool@my-project.iam.gserviceaccount.com"
      permissions: ["read"]

Principal format follows cloud IAM conventions: user:, group:, serviceAccount:, role: (Snowflake).

Column-level sensitivity

exposes:
  - exposeId: customers
    contract:
      schema:
        - name: customer_id
          type: STRING
        - name: email
          type: STRING
          sensitivity: pii        # ← BigQuery dynamic masking, Snowflake masking policy
        - name: ssn
          type: STRING
          sensitivity: phi        # ← stricter masking + audit logging

Sovereignty

Verified shape from fluid-schema-0.7.2.json:

sovereignty:
  jurisdiction: EU                  # enum: EU, US, UK, CA, AU, JP, CN, IN, BR, Global, Multi-Region
  allowedRegions: ["europe-west3", "europe-west4"]
  deniedRegions: ["us-central1"]
  dataResidency: true
  crossBorderTransfer: false
  transferMechanisms: ["SCC"]       # array of approved transfer mechanisms
  regulatoryFramework: ["GDPR"]
  enforcementMode: strict           # enum: strict, advisory, audit
  validationRequired: true

Compile-time check: with sovereignty.jurisdiction: EU + enforcementMode: strict, a binding.location.region: us-central1 is rejected by fluid policy-check before any cloud call is made.

The compile pipeline

contract.fluid.yaml
        │
        ▼
fluid policy-check       → Lint policies + sovereignty before deploy.
        │
        ▼
fluid policy-apply       → Map principals + permissions → native IAM.
                          (--mode is documented in `fluid policy-apply -h`.)

You don't have to be a cloud IAM expert

The whole point of accessPolicy.grants is that you write it once in human-readable form and Fluid Forge produces correct, audit-ready IAM artifacts for whichever cloud you're deploying to. No more hand-editing trust policies.

What gets emitted per cloud

fluid policy-apply translates the same accessPolicy.grants block into the cloud's native primitives:

CloudNative primitiveExample
GCP / BigQueryIAM_BINDINGS on the dataset (roles/bigquery.dataViewer, roles/bigquery.dataEditor) plus row-level security policies for column restrictionsgcloud projects add-iam-policy-binding ...
AWSS3 bucket policies + Glue resource policies + Athena workgroup permissionsaws s3api put-bucket-policy ...
SnowflakeGRANT SELECT/INSERT/... on tables + role-based access (ANALYST_ROLE, etc.) + masking policies for sensitivity: pii columnsGRANT SELECT ON TABLE ... TO ROLE ANALYST_ROLE
Local DuckDBNo-op (single-user, no IAM model) — but policy-check still validates the grants for correctness—

You can inspect what would be emitted before apply runs with fluid policy-apply --mode check (the canonical pre-flight) — it returns the bindings as JSON without touching the cloud.

Compliance frameworks

sovereignty.regulatoryFramework accepts an array of framework codes. Each one activates additional validation rules:

CodeWhat activates
GDPRCross-border-transfer rules; DPA-required field tagging; right-to-erasure compatibility check on Bronze → Silver builds
HIPAAsensitivity: phi columns must use stricter masking; audit logging mandatory; encryption-at-rest validation
SOXChange-management trail required (every apply writes a signed audit record); no destructive operations without a documented --reason
SOC2Activity logging on every read; service principal rotation reminders; SLA breach alerts to a designated audit principal
CCPASimilar to GDPR for California residents; consumer-rights compatibility

Multiple frameworks compose. A contract with regulatoryFramework: ['GDPR', 'SOX'] activates both rule sets. Conflicts (rare) surface as policy-check warnings.

Agent governance

agentPolicy is a separate top-level field that gates AI/LLM access at read-time. Not in the same block as accessPolicy, by design — human/service principals have different semantics from agents (agents have token budgets, denied use-cases, retention policies). See Agent Policy for the full treatment.

accessPolicy:
  grants:
    - principal: "group:analysts@company.com"
      permissions: ["read"]

agentPolicy:                         # ← separate, complementary
  allowedModels: ["gpt-4", "claude-3-opus"]
  deniedUseCases: ["training", "fine_tuning"]
  canStore: false
  auditRequired: true

A request to read this product passes only if BOTH apply: the principal is in accessPolicy.grants AND (when the principal is an agent) the agent's identity matches agentPolicy.allowedModels and the use-case is not in deniedUseCases.

Audit trail

Every apply, policy-apply, and (when auditRequired: true) every read produces an audit record. Format:

{
  "ts": "2026-04-12T14:23:01Z",
  "actor": "serviceAccount:airflow@prod.iam",
  "action": "read",
  "product": "gold.finance.customer_360_v1",
  "expose": "customer_360_table",
  "rows_returned": 12408,
  "use_case": "analysis",
  "model": "claude-3-opus",
  "audit_id": "aud_8f2c4..."
}

Records ship to whichever sink your platform uses by default — BigQuery audit log on GCP, CloudTrail on AWS, Snowflake's ACCESS_HISTORY view on Snowflake. The format is unified so cross-cloud queries work.

Where to look next

  • Agent Policy — declarative LLM/agent access boundaries
  • Quality, SLAs & Lineage — the rule sets dq.rules enforces alongside policy
  • fluid policy-check — pre-deploy linting
  • fluid policy-apply — emit + apply IAM bindings
Edit this page on GitHub
Last Updated: 5/17/26, 6:10 PM
Contributors: fas89, Claude Opus 4.7 (1M context)
Prev
Quality, SLAs & Lineage
Next
Agent Policy (LLM/AI governance)