Fides allows engineers to describe and validate privacy in Git for real-time risk evaluation in CI and unparalleled rights orchestration power.
Fides is an open-source approach to shipping respectful systems and fixing siloed privacy workflows. It brings privacy guardrails into SDLC processes by letting engineers describe privacy characteristics and enforce privacy rules directly in code. This unlocks a world of PrivEng possibility: programmatic rights orchestration, privacy metadata tracking directly in Git, and automated privacy checks in the CI pipeline.
Fideslang is a first-of-its-kind description language for privacy engineering; built to support all the data concepts necessary for describing a system under GDPR, CCPA, or LGPD.
It’s extensible, so you can add data definitions to suit any business, and it’s constructed to allow a natural understanding of any label for any user.
Fidesctl is a modern framework for data teams to implement data privacy requirements using existing CI/CD tools. It comprises a command-line tool and server that, in combination, are the management application for the core privacy definition language.
Fidesctl lets engineers track privacy metadata directly in Git and automate privacy checks in the CI pipeline.
Fidesops is built for data engineers with configurable scheduling, request execution, and webhook support to trigger internal services. It ensures timely, consistent, and safe enforcement of privacy rights across systems.
When a privacy request is sent to Fidesops, it uses policies written in Fideslang to generate a deterministic query plan to run across all connected systems, and fulfills the request according to the exact policy configured by the developer responsible.
Fidesops reduces the time to fulfill a privacy request in any infrastructure by programmatically orchestrating access & erasure across distributed systems. Where teams would spend an average of 83 hours manually fulfilling a single privacy request, fidesops reduces that time down to seconds.
Fidesctl replaces the need for clumsy review processes that may even feature manual data uses code audits by a legal stakeholder before shipping to production. To this end, GRC teams can collaborate with engineers to approve permitted policies in Fides that, through fidesctl, are enforced on the CI pipeline to ensure risk is carefully managed in development.
Fidesops follows security best practices across the stack, including end-to-end encryption, OAuth2 authentication, comprehensive audit logging, and as it’s an open source project, is available to the entire community to test and improve.
Welcome to fidesctl
Here’s a short video on how to get started with fidesctl; cloning the repository locally, running a quick deployment with Docker, and setting up a database.
Exploring policies in fidesctl
Here’s a short video exploring a demo policy file in fidesctl; you’ll see how each policy comprises an array of rules for datasets described by fideslang.
Annotating data with fidesctl
Here’s a short video on how to begin annotating data in fidectl using the annotate-dataset command in the CLI, with an assist from an included data hierarchy visualizer.
The internet is growing up. Privacy protections are no longer “nice to have” – they’re demanded by users and legally required by an ever-growing set of global regulations. Software engineers created the Information Big Bang; software engineers are uniquely equipped to solve the challenges contained therein. Join the Fides community to interact with like-minded privacy engineers and receive hands-on support.