{"id":19073,"date":"2026-03-27T22:55:17","date_gmt":"2026-03-28T02:55:17","guid":{"rendered":"https:\/\/www.iri.com\/blog\/?p=19073"},"modified":"2026-04-14T15:06:42","modified_gmt":"2026-04-14T19:06:42","slug":"introducing-the-iri-ops-governance-system-ogs","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/","title":{"rendered":"Introducing The IRI Ops Governance System (OGS)"},"content":{"rendered":"<p><em><span style=\"font-weight: 400;\"><strong>Abstract<\/strong>: <\/span><span style=\"font-weight: 400;\">With the release of CoSort Version 11 in the first quarter of 2026 is a new, custom-governed infrastructure for granular permission, validation, logging and auditing of all structured data processing, protection and prototyping jobs in production on Linux and Windows that are powered by the IRI Sort Control Language (SortCL) program. This article introduces this infrastructure, the IRI Operational Governance System (OGS). Articles to follow will cover each of the OGS components in detail.<\/span><\/em><\/p>\n<p><span style=\"font-weight: 400;\">Data pipelines today must satisfy two critical, and sometimes competing, requirements: high-performance data processing and strict governance controls. More specifically, data-driven enterprises need to transform, cleanse, mask, and move big data quickly while also maintaining security, accountability, and compliance for both their data <\/span><span style=\"font-weight: 400;\">and<\/span><span style=\"font-weight: 400;\"> their data processing jobs. <\/span><\/p>\n<p><a href=\"https:\/\/www.iri.com\/blog\/iri\/business\/whats-new-in-cosort-11\/\"><span style=\"font-weight: 400;\">Version 11<\/span><\/a><span style=\"font-weight: 400;\"> of the IRI CoSort data manipulation package, released in the first quarter of 2026, features a major new set of capabilities to govern structured data management jobs.\u00a0 The IRI <\/span><b>Operational Governance System (OGS) <\/b><span style=\"font-weight: 400;\">is an optional,\u00a0integrated runtime framework that wraps around <\/span><a href=\"https:\/\/www.iri.com\/products\/cosort\/sortcl\"><span style=\"font-weight: 400;\">SortCL<\/span><\/a><span style=\"font-weight: 400;\"> job executions to define and enforce job and data access control policies, verify job script integrity, and manage detailed Audit Log content.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-19086 aligncenter\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/OGS-1024x632.png\" alt=\"\" width=\"552\" height=\"341\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/OGS-1024x632.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/OGS-300x185.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/OGS-768x474.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/OGS.png 1193w\" sizes=\"(max-width: 552px) 100vw, 552px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Because the SortCL program powers multiple IRI products, the OGS benefits users of these tools:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>IRI CoSort <\/b><span style=\"font-weight: 400;\">\u00a0\u2013 to sort, transform, and report<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>IRI FieldShield<\/b><span style=\"font-weight: 400;\"> \u2013 to classify and mask Relational Databases (RDBs) and flat files<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>IRI NextForm<\/b><span style=\"font-weight: 400;\"> \u2013 to migrate data types, file formats, and DB data<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>IRI RowGen<\/b><span style=\"font-weight: 400;\"> \u2013 to subset or synthesize test data for multiple targets<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>IRI Ripcurrent <\/b><span style=\"font-weight: 400;\">\u00a0\u2013 to replicate and\/or mask new DB rows in real-time<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>IRI Voracity<\/b><span style=\"font-weight: 400;\"> \u2013 to do all of the above, plus ETL, data quality, SCD, and more.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\"><strong>IRI DarkShield<\/strong> is not powered by SortCL and has its own authorization and logging framework. <span id='easy-footnote-1-19073' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/#easy-footnote-bottom-1-19073' title='&lt;\/span&gt;&lt;i&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;DarkShield nevertheless also produces an additional JSON audit log largely compatible with the new SortCL audit log schema. Those log files can thus also be examined in the OGS audit log wrangler utility, or via SortCL, Splunk, and other log analytics tools, too, along with SortCL jobs that may run with DarkShield, like in &lt;\/span&gt;&lt;\/i&gt;&lt;a href=&quot;https:\/\/www.iri.com\/blog\/test-data\/generating-test-data-in-pdf-and-images\/&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;RowGen&lt;\/span&gt;&lt;\/i&gt;&lt;\/a&gt;&lt;i&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt; or &lt;\/span&gt;&lt;\/i&gt;&lt;a href=&quot;https:\/\/www.iri.com\/blog\/etl\/etl-part-2\/&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Voracity&lt;\/span&gt;&lt;\/i&gt;&lt;\/a&gt;&lt;i&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.'><sup>1<\/sup><\/a><\/span><\/span><\/i><i><\/i><\/p>\n<p><span style=\"font-weight: 400;\">This article introduces the purposes, architecture, and key components of the OGS to support compliance with IRI data processing jobs, which, in some cases, support data governance goals (e.g., by cleansing and anonymizing data sources).\u00a0<\/span><\/p>\n<h5><b>Why Operational Governance Matters<\/b><\/h5>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-19092 alignright\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Why-Ops-Governance-matters-1024x889.png\" alt=\"\" width=\"416\" height=\"361\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Why-Ops-Governance-matters-1024x889.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Why-Ops-Governance-matters-300x260.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Why-Ops-Governance-matters-768x667.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Why-Ops-Governance-matters.png 1047w\" sizes=\"(max-width: 416px) 100vw, 416px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Data operations increasingly run across hybrid cloud and on-premise infrastructures, involving diverse storage platforms, databases, and processing environments.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At the same time, enterprises must comply with internal policies and regulations requiring:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">controlled execution of data processing jobs<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">strict access permissions<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">the ability to audit operational activity<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">protection against unauthorized script changes<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">traceability of data manipulation workflows<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Traditional governance solutions often rely on external orchestration systems or security layers. OGS takes a different approach by embedding governance directly inside the SortCL runtime environment, where the actual data processing occurs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This approach enables organizations to enforce governance policies without sacrificing the performance advantages of the CoSort engine, which can perform high-volume transformations, joins, and masking operations in a single pass.\u00a0<\/span><\/p>\n<h5><b>What Does the IRI OGS Do?<\/b><\/h5>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-19099\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/IRI-OGS-1024x604.png\" alt=\"\" width=\"577\" height=\"340\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/IRI-OGS-1024x604.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/IRI-OGS-300x177.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/IRI-OGS-768x453.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/IRI-OGS.png 1207w\" sizes=\"(max-width: 577px) 100vw, 577px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">The Operational Governance System is a policy-driven runtime framework that controls and records the execution of SortCL jobs. It is a production permission and logging system for:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Granular Role-based and attribute-based access controls (RBAC \/ ABAC) based on log-in names to remote server executables<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Job script integrity validation<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Metadata recording (basic data cataloging)\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Machine-readable audit trails with built-in retention and wrangling facilities<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Governance rules are defined in policy files that specify access permissions and runtime behavior for SortCL jobs and their components.\u00a0<\/span><\/p>\n<h5><b>OGS Architecture Overview<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">The Operational Governance System operates as a layer surrounding SortCL execution, parsing jobs scripts and applying governance policies before and after runtime events.<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-19093\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/IRI-Ops-Governance-Architecture-1024x606.png\" alt=\"\" width=\"1024\" height=\"606\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/IRI-Ops-Governance-Architecture-1024x606.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/IRI-Ops-Governance-Architecture-300x178.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/IRI-Ops-Governance-Architecture-768x455.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/IRI-Ops-Governance-Architecture-1536x909.png 1536w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/IRI-Ops-Governance-Architecture.png 1110w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">This architecture ensures data and job governance controls defined for SortCL-compatible runtime scripts are applied at runtime, regardless of whether jobs are launched from:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The command line<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Within a batch script<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Scheduling tools<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The IRI Workbench GUI<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">ETL, AI, TDM, and other applications integrating SortCL<\/span><\/li>\n<\/ul>\n<h5><b>Key OGS Components\u00a0<\/b><\/h5>\n<h6><b>1. Role-Based and Attributed Based Access Control (RBAC &amp; ABAC)<\/b><\/h6>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-19103 alignright\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Policy-Based-Access-Control.png\" alt=\"\" width=\"373\" height=\"367\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Policy-Based-Access-Control.png 925w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Policy-Based-Access-Control-300x295.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Policy-Based-Access-Control-768x755.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Policy-Based-Access-Control-70x70.png 70w\" sizes=\"(max-width: 373px) 100vw, 373px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">The foundation of OGS is a policy framework. There is a Policy File that determines who can execute or modify SortCL jobs based on specified rules. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">These rules can be defined in a global, or application-specific, Policy File to control read\/run\/write permissions for named:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">runtime users, groups, and\/or roles\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">job scripts<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">job items, including sources and targets, fields, functions, classes, sets, conditions, etc.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">This flexible model allows organizations to catalog and enforce fine-grained governance policies for SortCL operations that align with internal security frameworks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Note that OGS Policy Files <em>also<\/em> define whether job scripts will be signature-validated at runtime, along with the content of, and retention rules for, the audit logs (see below). Policy File contents are defined, modified, and changed-logged through a secure, menu-driven CLI utility called Policy File Manager (PFM).<\/span><\/p>\n<h6><b>2. Job Script Integrity Verification<\/b><\/h6>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-19104 alignright\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Job-Script-Integrity-Verification-1024x566.png\" alt=\"\" width=\"458\" height=\"253\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Job-Script-Integrity-Verification-1024x566.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Job-Script-Integrity-Verification-300x166.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Job-Script-Integrity-Verification-768x424.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Job-Script-Integrity-Verification.png 1110w\" sizes=\"(max-width: 458px) 100vw, 458px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Data governance requires assurance that operational scripts cannot be altered without authorization. OGS introduces digital signature validation for SortCL job scripts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This mechanism:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">detects unauthorized modifications to job files<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">prevents execution of tampered scripts<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">ensures trusted workflows in production environments<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Script signing tools and encryption utilities are included in the CoSort 11 distribution to support these verification processes. (<\/span><a href=\"https:\/\/www.prweb.com\/releases\/iri-launches-cosort-11-with-operational-governance-cloud-integration-and-more-legacy-sort-modernization-302663146.html?utm_source=chatgpt.com\"><span style=\"font-weight: 400;\">PRWeb<\/span><\/a><span style=\"font-weight: 400;\">)<\/span><\/p>\n<h6><b>3. Metadata &amp; User Catalog<\/b><\/h6>\n<p style=\"text-align: right;\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-19106 alignright\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Metadata-User-Catalog.png\" alt=\"\" width=\"349\" height=\"302\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Metadata-User-Catalog.png 971w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Metadata-User-Catalog-300x259.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Metadata-User-Catalog-768x664.png 768w\" sizes=\"(max-width: 349px) 100vw, 349px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">OGS Policy Files \u2013 in addition to defining role and attribute-based access controls, signature, and auditing policies \u2013 can also be used to describe and share information about users, groups, and roles, as well as individual job elements. The Policy File can preserve details about the:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Name of, and metadata job items defined in SortCL scripts<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Users, Groups, and Roles are defined in the Policy File.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The Policy File can also function as a rudimentary data catalog for organizations that:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">do not yet have an enterprise-scale cataloging system.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">require a separate mechanism to catalog data involved only in SortCL-compatible operations.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">While limited compared to pure data catalog platforms, the Policy File offers some advantages:<\/span><\/p>\n<table  class=\" table table-hover\" style=\"height: 131px; width: 97.5129%; border-style: solid; border-color: #999797;\">\n<tbody>\n<tr style=\"height: 35px;\">\n<td style=\"width: 16.1578%; height: 35px; border-style: solid; border-color: #999797; background-color: #3b3b3b; text-align: center;\"><span style=\"color: #ffffff;\"><b>Feature<\/b><\/span><\/td>\n<td style=\"width: 50.6361%; height: 35px; border-style: solid; border-color: #999797; background-color: #3b3b3b; text-align: center;\"><span style=\"color: #ffffff;\"><b>IRI Policy File<\/b><\/span><\/td>\n<td style=\"width: 34.6983%; height: 35px; border-style: solid; border-color: #999797; background-color: #3b3b3b; text-align: center;\"><span style=\"color: #ffffff;\"><b>Enterprise Catalogs<\/b><\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 16.1578%; height: 24px; border-style: solid; border-color: #999797;\"><b>Integration<\/b><\/td>\n<td style=\"width: 50.6361%; height: 24px; border-style: solid; border-color: #999797;\"><span style=\"font-weight: 400;\">Embedded directly in CoSort and compatible workflows<\/span><\/td>\n<td style=\"width: 34.6983%; height: 24px; border-style: solid; border-color: #999797;\"><span style=\"font-weight: 400;\">External, connector-based<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 16.1578%; height: 24px; border-style: solid; border-color: #999797;\"><b>Complexity<\/b><\/td>\n<td style=\"width: 50.6361%; height: 24px; border-style: solid; border-color: #999797;\"><span style=\"font-weight: 400;\">Lightweight, minimal setup<\/span><\/td>\n<td style=\"width: 34.6983%; height: 24px; border-style: solid; border-color: #999797;\"><span style=\"font-weight: 400;\">Robust, higher overhead<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 16.1578%; height: 24px; border-style: solid; border-color: #999797;\"><b>Governance<\/b><\/td>\n<td style=\"width: 50.6361%; height: 24px; border-style: solid; border-color: #999797;\"><span style=\"font-weight: 400;\">Immediate linkage to transformation rules<\/span><\/td>\n<td style=\"width: 34.6983%; height: 24px; border-style: solid; border-color: #999797;\"><span style=\"font-weight: 400;\">Broader governance frameworks<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 16.1578%; height: 24px; border-style: solid; border-color: #999797;\"><b>Cost\/Footprint<\/b><\/td>\n<td style=\"width: 50.6361%; height: 24px; border-style: solid; border-color: #999797;\"><span style=\"font-weight: 400;\">Included with CoSort, no extra infrastructure<\/span><\/td>\n<td style=\"width: 34.6983%; height: 24px; border-style: solid; border-color: #999797;\"><span style=\"font-weight: 400;\">Separate licensing and deployment<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h6><b>Additional Benefits<\/b><\/h6>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><i><span style=\"font-weight: 400;\">Operational Synergy<\/span><\/i><span style=\"font-weight: 400;\">: Metadata is tied directly to the execution environment, ensuring fidelity between catalog and runtime.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><i><span style=\"font-weight: 400;\">Audit Support<\/span><\/i><span style=\"font-weight: 400;\">: Documentation of Form Items, rules, and lineage simplifies compliance reporting.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><i><span style=\"font-weight: 400;\">Incremental Governance<\/span><\/i><span style=\"font-weight: 400;\">: Provides a starting point for cataloging that can later feed into larger enterprise systems.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><i><span style=\"font-weight: 400;\">Complementary Role<\/span><\/i><span style=\"font-weight: 400;\">: Can serve as a metadata source for external catalogs, enriching them with precise transformation-level details.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Note, however, that the responsibility for collecting, inputting, and determining the visibility of Policy File information rests with the OGS Governor.<\/span><\/p>\n<h6><b>4. JSON-Formatted Job Audit Logs<\/b><\/h6>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-19107 alignright\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/JSON-Formatted-Job-Audit-Logs-1024x767.png\" alt=\"\" width=\"432\" height=\"324\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/JSON-Formatted-Job-Audit-Logs-1024x767.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/JSON-Formatted-Job-Audit-Logs-300x225.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/JSON-Formatted-Job-Audit-Logs-768x575.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/JSON-Formatted-Job-Audit-Logs.png 1102w\" sizes=\"(max-width: 432px) 100vw, 432px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Every governance decision and runtime action can be recorded in human- and machine-readable job logs. These customizable logs capture events such as:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">execution attempts, timings, and system resources (requested and used)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">policy evaluation results (permission outcomes)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">named users, scripts, data sources, classes, functions, and conditions, etc.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Because the new logs are produced in JSON format, they can easily integrate with:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SIEM platforms like Splunk Enterprise Security<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">observability tools, including the built-in IRI audit log wrangler supporting JPath queries<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">AI and machine learning pipelines<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">OGS policies can also define log contents and retention rules. Logs can be created empty or full, contain a minimal set of attributes or those belonging to a certain category (e.g., performance), or be built for specific users with a custom mix of attributes.\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-19167 aligncenter\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/image-2-1-1024x560.png\" alt=\"\" width=\"840\" height=\"459\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/image-2-1-1024x560.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/image-2-1-300x164.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/image-2-1-768x420.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/image-2-1-1536x840.png 1536w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/image-2-1-2048x1121.png 2048w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/image-2-1.png 1110w\" sizes=\"(max-width: 840px) 100vw, 840px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Log retention policy can be defined to move and delete log files on a schedule, and log contents can be filtered after generation to save disk space. See <a href=\"https:\/\/www.iri.com\/blog\/data-transformation2\/controlling-the-growth-of-new-iri-audit-logs\/\">this article<\/a> for more information.<\/span><\/p>\n<h6><b>5. Audit Log Query and Export\u00a0<\/b><\/h6>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-19109 alignright\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Audit-Log-Query-Export-1024x704.png\" alt=\"\" width=\"457\" height=\"314\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Audit-Log-Query-Export-1024x704.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Audit-Log-Query-Export-300x206.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Audit-Log-Query-Export-768x528.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/Audit-Log-Query-Export.png 1110w\" sizes=\"(max-width: 457px) 100vw, 457px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">To analyze operational activity, CoSort 11 includes a built-in audit log wrangling utility that runs on the command line for interactive and batch analysis, as well as for extracting SortCL job log data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This tool allows both job performance analysts and data security analysts to:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">query logs using JSONPath expression logic<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">review and export subsets of audit records<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use delimited data for analysis in graphical tools like Excel and Splunk<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Example query:<\/span><\/p>\n<pre style=\"padding-left: 40px;\"><span style=\"color: #008000;\">Select : [$.execution.startTime]<\/span>\r\n<span style=\"color: #008000;\">Where :\u00a0 [$[?(@.execution.startTime &gt; \"2025-10-31T23:59:59\")]]<\/span>\r\n<span style=\"color: #008000;\">Where :\u00a0 [$[?(@.execution.startTime &lt; \"2025-12-01T00:00:00\")]]<\/span>\r\n<span style=\"color: #008000;\">Select : [$.statistics.jobResults.returnCode]<\/span>\r\n<span style=\"color: #008000;\">Select : [$.statistics.jobResults.recordsProcessed]<\/span><\/pre>\n<p><span style=\"font-weight: 400;\">The wrangler enables rapid detection of policy violations, job performance settings, and more, while also supporting post-facto qualitative log file culling to save disk space (where permitted).<\/span><\/p>\n<h5><b>Sample OGS Uses<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Because SortCL powers many IRI tools, OGS provides a shared governance layer across the entire platform.<\/span><\/p>\n<p><b>Data Integration<br \/>\n<\/b>In IRI Voracity and IRI NextForm, governance policies can control ETL and data migration jobs that move data between databases, files, and cloud platforms.<\/p>\n<p><b>Data Protection<br \/>\n<\/b><span style=\"font-weight: 400;\">In IRI FieldShield, OGS policies can restrict and log execution of masking operations involving highly sensitive datasets.<\/span><\/p>\n<p><b>Test Data Provisioning<br \/>\n<\/b><span style=\"font-weight: 400;\">In IRI RowGen, governance policies can ensure that synthetic data generation workflows comply with internal testing policies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Because these tools all leverage the same SortCL runtime, OGS ensures consistent governance enforcement across diverse data workflows.<\/span><\/p>\n<h5><b>OGS Benefits for Enterprise Users<\/b><\/h5>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-19110 alignright\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/OGS-benefits.png\" alt=\"\" width=\"419\" height=\"507\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/OGS-benefits.png 696w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/OGS-benefits-248x300.png 248w\" sizes=\"(max-width: 419px) 100vw, 419px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Organizations adopting CoSort 11 gain several operational advantages:<br \/>\n<\/span><b><br \/>\nStronger Security<br \/>\n<\/b>Fine-grained RBAC and ABAC policies protect sensitive data operations.<\/p>\n<p><b>Trusted Production Workflows<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Digital signatures ensure job scripts remain unmodified and authorized.<\/span><\/p>\n<p><b>Comprehensive Auditability<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">JSON-based logs provide a detailed record of operational activity.<\/span><\/p>\n<p><b>Unified Governance<\/b><br \/>\n<span style=\"font-weight: 400;\">Policies apply consistently across multiple IRI tools and workflows.<\/span><\/p>\n<p><b>Compliance Readiness<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Structured audit trails support regulatory frameworks and internal controls.<\/span><\/p>\n<p><b>Runtime Efficiency<br \/>\n<\/b>By integrating governance checks into SortCL&#8217;s existing multi-threaded and\/or task-consolidating runtime environment rather than relying on external orchestration layers, OGS maintains the high data throughput and speed expected by existing CoSort users.<\/p>\n<h5><b>Conclusion<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">The Operational Governance System (OGS) in IRI CoSort 11 represents a major advancement in custom-governed infrastructure for high-performance data management jobs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By combining:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">policy-driven, granular attribute- and role-based access control;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">script integrity verification;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">metadata-aware governance and cataloging; and<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">robust audit logs and log management,\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">OGS enables organizations using IRI software to maintain secure, compliant, and verifiable data workflows while continuing to leverage the speed and flexibility of the underlying SortCL program. This new infrastructure provides a unified governance layer that strengthens operational control across the entire IRI data management product ecosystem.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Upcoming articles on the IRI blog will dive deeper into the components of OGS, revealing their features and use cases.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Abstract: With the release of CoSort Version 11 in the first quarter of 2026 is a new, custom-governed infrastructure for granular permission, validation, logging and auditing of all structured data processing, protection and prototyping jobs in production on Linux and Windows that are powered by the IRI Sort Control Language (SortCL) program. This article introduces<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/\" title=\"Introducing The IRI Ops Governance System (OGS)\">Read More<\/a><\/div>\n","protected":false},"author":10,"featured_media":19112,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[34],"tags":[2423,2447,2422,2426,2449,2430,2450,2428,2425,340,2443,2418,2444,2431,2419,1213,5,2437,2440,2448,2434,2432,2441,2433,2439,546,2420,520,553,526,789,2445,2427,2438,2429,2396,2435,2397,2421,2417,2436,2424,2446,68,2442],"class_list":["post-19073","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","tag-abac","tag-anonymization-log","tag-attribute-based-access-control","tag-audit-logging","tag-compliance-log","tag-compliance-monitoring","tag-custom-governed","tag-data-audit-trails","tag-data-compliance","tag-data-governance","tag-data-operations-governance","tag-data-pipeline-governance","tag-data-pipeline-security","tag-data-pipelines","tag-data-processing-governance","tag-data-security-governance","tag-data-transformation","tag-data-workflow-traceability","tag-dataops-governance","tag-de-identification-logs","tag-enterprise-data-operations","tag-etl-governance","tag-governing-data-processing","tag-high-performance-data-processing","tag-hybrid-data-infrastructure","tag-iri-cosort","tag-iri-data-management-platform","tag-iri-fieldshield","tag-iri-nextform","tag-iri-rowgen","tag-iri-voracity","tag-job-audit-logging","tag-json-audit-logs","tag-metadata-cataloging","tag-operational-audit-logging","tag-operational-governance-system","tag-policy-based-governance","tag-rbac","tag-role-based-access-control","tag-runtime-governance","tag-runtime-policy-enforcement","tag-script-integrity-validation","tag-software-performance-logging","tag-sortcl","tag-test-data-governance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Introducing The IRI Ops Governance System (OGS) - IRI<\/title>\n<meta name=\"description\" content=\"The IRI Operational Governance System wraps RBAC, script validation, and robust audit logging and log management around data processing jobs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introducing The IRI Ops Governance System (OGS)\" \/>\n<meta property=\"og:description\" content=\"The IRI Operational Governance System wraps RBAC, script validation, and robust audit logging and log management around data processing jobs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-28T02:55:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-14T19:06:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/OGS-featured-image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1110\" \/>\n\t<meta property=\"og:image:height\" content=\"532\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Susan Gegner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Susan Gegner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/\"},\"author\":{\"name\":\"Susan Gegner\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/87be5da567628ab9396ca81170f36d63\"},\"headline\":\"Introducing The IRI Ops Governance System (OGS)\",\"datePublished\":\"2026-03-28T02:55:17+00:00\",\"dateModified\":\"2026-04-14T19:06:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/\"},\"wordCount\":1704,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/OGS-featured-image.png\",\"keywords\":[\"ABAC\",\"Anonymization log\",\"Attribute-Based Access Control\",\"Audit Logging\",\"Compliance log\",\"Compliance Monitoring\",\"custom-governed\",\"Data Audit Trails\",\"Data Compliance\",\"data governance\",\"data operations governance\",\"Data Pipeline Governance\",\"data pipeline security\",\"Data Pipelines\",\"Data Processing Governance\",\"Data Security Governance\",\"data transformation\",\"Data Workflow Traceability\",\"DataOps governance\",\"De-identification logs\",\"Enterprise Data Operations\",\"ETL Governance\",\"Governing data processing\",\"High Performance Data Processing\",\"Hybrid Data Infrastructure\",\"IRI CoSort\",\"IRI Data Management Platform\",\"IRI FieldShield\",\"IRI NextForm\",\"IRI RowGen\",\"IRI Voracity\",\"Job audit logging\",\"JSON Audit Logs\",\"Metadata Cataloging\",\"Operational Audit Logging\",\"Operational Governance System\",\"Policy-Based Governance\",\"RBAC\",\"Role-Based Access Control\",\"Runtime Governance\",\"Runtime Policy Enforcement\",\"Script Integrity Validation\",\"Software performance logging\",\"SortCL\",\"Test data governance\"],\"articleSection\":[\"IRI Business\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/\",\"url\":\"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/\",\"name\":\"Introducing The IRI Ops Governance System (OGS) - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/OGS-featured-image.png\",\"datePublished\":\"2026-03-28T02:55:17+00:00\",\"dateModified\":\"2026-04-14T19:06:42+00:00\",\"description\":\"The IRI Operational Governance System wraps RBAC, script validation, and robust audit logging and log management around data processing jobs.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/OGS-featured-image.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/OGS-featured-image.png\",\"width\":1110,\"height\":532},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Introducing The IRI Ops Governance System (OGS)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/87be5da567628ab9396ca81170f36d63\",\"name\":\"Susan Gegner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2b1ca5592a65d44483351292cf1ae00a?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2b1ca5592a65d44483351292cf1ae00a?s=96&d=blank&r=g\",\"caption\":\"Susan Gegner\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/susang\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Introducing The IRI Ops Governance System (OGS) - IRI","description":"The IRI Operational Governance System wraps RBAC, script validation, and robust audit logging and log management around data processing jobs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/","og_locale":"en_US","og_type":"article","og_title":"Introducing The IRI Ops Governance System (OGS)","og_description":"The IRI Operational Governance System wraps RBAC, script validation, and robust audit logging and log management around data processing jobs.","og_url":"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/","og_site_name":"IRI","article_published_time":"2026-03-28T02:55:17+00:00","article_modified_time":"2026-04-14T19:06:42+00:00","og_image":[{"width":1110,"height":532,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/OGS-featured-image.png","type":"image\/png"}],"author":"Susan Gegner","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Susan Gegner","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/"},"author":{"name":"Susan Gegner","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/87be5da567628ab9396ca81170f36d63"},"headline":"Introducing The IRI Ops Governance System (OGS)","datePublished":"2026-03-28T02:55:17+00:00","dateModified":"2026-04-14T19:06:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/"},"wordCount":1704,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/OGS-featured-image.png","keywords":["ABAC","Anonymization log","Attribute-Based Access Control","Audit Logging","Compliance log","Compliance Monitoring","custom-governed","Data Audit Trails","Data Compliance","data governance","data operations governance","Data Pipeline Governance","data pipeline security","Data Pipelines","Data Processing Governance","Data Security Governance","data transformation","Data Workflow Traceability","DataOps governance","De-identification logs","Enterprise Data Operations","ETL Governance","Governing data processing","High Performance Data Processing","Hybrid Data Infrastructure","IRI CoSort","IRI Data Management Platform","IRI FieldShield","IRI NextForm","IRI RowGen","IRI Voracity","Job audit logging","JSON Audit Logs","Metadata Cataloging","Operational Audit Logging","Operational Governance System","Policy-Based Governance","RBAC","Role-Based Access Control","Runtime Governance","Runtime Policy Enforcement","Script Integrity Validation","Software performance logging","SortCL","Test data governance"],"articleSection":["IRI Business"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/","url":"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/","name":"Introducing The IRI Ops Governance System (OGS) - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/OGS-featured-image.png","datePublished":"2026-03-28T02:55:17+00:00","dateModified":"2026-04-14T19:06:42+00:00","description":"The IRI Operational Governance System wraps RBAC, script validation, and robust audit logging and log management around data processing jobs.","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/OGS-featured-image.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/OGS-featured-image.png","width":1110,"height":532},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/iri\/business\/introducing-the-iri-ops-governance-system-ogs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Introducing The IRI Ops Governance System (OGS)"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/87be5da567628ab9396ca81170f36d63","name":"Susan Gegner","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2b1ca5592a65d44483351292cf1ae00a?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2b1ca5592a65d44483351292cf1ae00a?s=96&d=blank&r=g","caption":"Susan Gegner"},"url":"https:\/\/www.iri.com\/blog\/author\/susang\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2026\/03\/OGS-featured-image.png","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/19073"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=19073"}],"version-history":[{"count":30,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/19073\/revisions"}],"predecessor-version":[{"id":19168,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/19073\/revisions\/19168"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/19112"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=19073"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=19073"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=19073"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}