A Data Pod is a logical storage unit that encapsulates data together with enforceable rules for quality, compliance, access control, and lineage. It acts as a hard execution boundary within the Nexion runtime.
"A Data Pod is a logical storage unit that encapsulates data together with enforceable rules for quality, compliance, access control, and lineage. It acts as a hard execution boundary within the Nexion runtime."
Unlike traditional datasets that are passive storage, Data Pods actively enforce rules at runtime. Data cannot exist in a Pod without passing through its configured validation and protection pipeline.
| Aspect | Traditional Dataset | Nexion Data Pod |
|---|---|---|
| Primary Function | Storage | Storage + Enforcement |
| Policies | Documented | Executed at Runtime |
| Compliance | Only at rest (after storage) | At execution + at rest |
| Enforcement | User-dependent | Runtime-enforced |
| Data Quality | Optional validation | Mandatory gates |
| PII/PHI Protection | Manual process | Auto-enforced |
| Lineage | External tool | Built-in tracking |
Data Pods are the core differentiator of Nexion. They transform passive storage into active, governed data products.
Tables:
Tables:
Tables:
Each pod connects to any Storage Destination (OneLake, ADLS, S3, GCS) with isolated encryption keys and access policies
Choose the right compliance level for your data. Each level includes all features from lower levels plus additional protections.
Standard data without special compliance requirements
Use cases:
Personal Identifiable Information with GDPR/CCPA protection
Use cases:
Protected Health Information with HIPAA Safe Harbor
Use cases:
Payment Card Industry Data Security Standard
Use cases:
Configure how each field type is protected. Different methods for different use cases.
MASKPartial masking that preserves format
Example:
john@email.com → ****@email.comHASHOne-way SHA-256 cryptographic hash
Example:
john@email.com → a8f5f167f44f...REDACTComplete removal with placeholder
Example:
123-45-6789 → [SSN REDACTED]ENCRYPTReversible AES-256 encryption
Example:
john@email.com → gAAAAABl7x2K...TOKENIZEReplace with token, original in vault
Example:
john@email.com → tok_a1b2c3d4e5f6SKIPNo transformation (explicit opt-out)
Example:
john@email.com → john@email.comEach Data Pod can use a different Storage Destination. Choose based on your cloud strategy, compliance requirements, or performance needs.
Fabric native, Unity Catalog compatible
Hierarchical namespace, Azure native
AWS native, most compatible
GCP native, BigQuery integration
All storage uses Delta Lake format
ACID transactions, time travel, and schema evolution on any backend
Create your first Data Pod and start protecting PII/PHI automatically.