WAF++ WAF++
Back to WAF++ Homepage

Sovereign Cloud – Definition

What is Sovereign Cloud?

Sovereign Cloud describes the state in which an organization possesses demonstrable, technically enforceable control over all relevant dimensions of its cloud infrastructure:

Sovereign Cloud = Control over:
  ├── Jurisdiction & Data Residency
  ├── Encryption Keys
  ├── Privileged Access
  ├── Outbound Data Flows
  ├── Dependencies & Subprocessors
  └── Exit Capability

Sovereignty is not synonymous with:

  • On-premises infrastructure (Sovereign Cloud is possible in the public cloud)

  • A product certification from a cloud provider

  • A one-time audit result without continuous verification

The Sovereign Spectrum

Sovereignty is not a binary state. It exists on a spectrum:

Level Description Typical Scenario

Operational Sovereignty

Control over operations, access, logging and processes within a cloud environment.

No special regulatory requirements; internally controlled operations.

Data Sovereignty

Control over storage location, encryption and transfer of data.

GDPR compliance, BSI C5, public administration.

Regulatory Sovereignty

Demonstrating fulfillment of specific legal and regulatory requirements.

EUCS, critical infrastructure (KRITIS), NIS2, financial sector.

Technological Sovereignty

Ability to switch providers or operate own developments.

Strategic independence, multi-cloud strategy.

Delimitation: What Sovereign Cloud Does Not Solve

What Why not in scope

Physical security of the data center

Falls within the cloud provider’s shared responsibility area.

Legal assessment of jurisdictions

Requires legal expertise; WAF++ provides the technical framework, not legal advice.

Complete provider independence

Overlaps with the Reliability pillar (multi-cloud). Sovereign focuses on control, not redundancy.

Network security (general)

Fundamental network security is in the Security pillar. Sovereign addresses egress control as a data residency topic.

Sovereign Cloud in the WAF++ Context

In WAF++, Sovereign Cloud is a standalone pillar that interacts with other pillars:

Security ──────────────── provides: protection mechanisms (IAM, Encryption, Monitoring)
Governance ─────────────── provides: policy framework, controls structure, audit
Reliability ────────────── provides: backup, recovery, fault tolerance
Operations ─────────────── provides: incident response, monitoring, change management
Sovereign Cloud ─────────── integrates: jurisdiction, keys, exit, subprocessors

Sovereign Cloud consumes capabilities from other pillars (e.g. logging from Operations, encryption from Security) and extends them with jurisdictional and regulatory requirements.

Target State

A sovereign-mature platform is characterized by:

  • All data demonstrably stored in defined, permitted regions

  • Encryption keys owned by the organization (CMK/BYOK/HYOK)

  • Privileged access is minimal, time-bound, fully logged and reviewed

  • No data exfiltration possible without explicit configuration and monitoring

  • All subprocessors inventoried and secured with DPA

  • The organization can switch its cloud provider within 90 days

The target state depends on maturity level. Not every organization needs all five levels immediately. Start with the most critical: data residency and region pinning.