One example method includes checking an asset against an Inclusion List and/or an Exclusion List to determine if the asset is permitted to contribute data, generated by the asset, to an enterprise data confidence fabric, when the asset is present on the Inclusion List, or not present on the Exclusion List, designating the asset as a trusted asset and appending the data generated by the asset to a ledger of the enterprise data confidence fabric, updating a ledger content index to reflect the data that was appended to the ledger, and annotating the data generated by the asset with trust metadata.