Authors:
Europe’s pursuit of strategic autonomy has moved from the policy forum to the procurement desk. Hyperscalers are responding with billion-euro commitments, such as Amazon’s €7.8 billion investment in the forthcoming “AWS European Sovereign Cloud,” set to launch in 20251. In Luxembourg, DEEP and OVHcloud have announced a sovereign region2 endorsed by the Grand Duchy’s government.
Yet lawmakers are still debating the legal definition of sovereignty. The most prominent example is the EU Cloud Services Scheme (EUCS), Europe’s flagship cybersecurity label. Initially, it required cloud providers to be shielded from non-EU law, preventing U.S. authorities from accessing data under laws like the CLOUD Act, for example. However, this requirement was removed in the latest draft, prompting tech associations to push for a quick decision3 while local European providers argue that this change is unfair4. In parallel, new regulations such as the AI Act, Data Act, and DORA are introducing fresh obligations on model training, data lineage and portability, requiring boards to prove control over their digital operations, not just claim it.
Meanwhile, national-level initiatives are progressing steadily. In France, the SecNumCloud label remains a benchmark for high-assurance cloud services. Players like Scaleway and S3NS (a joint venture between Orange and Google Cloud) are seeking or have gained top-level certification, showing that local compliance remains key to digital autonomy.
Gartner5 defines digital sovereignty as a strategic imperative for ensuring autonomy over data, operations, and technology within specific geographic areas, aligning with local regulations. It mitigates the risks associated with foreign data control or influence and enhances compliance with local regulations. It aims to achieve a secure and resilient IT ecosystem, driven by national security and economic considerations.
Based on these developments, it is crucial to define what digital sovereignty actually means. In this context, we believe:
Cloud, data, and collaboration platforms are today’s front line because they blend technical dependency with extraterritorial legal exposure.
Field |
Why it matters now |
Cloud and infrastructure |
The US CLOUD Act or similar laws can require providers to hand over data, even when if it is physically stored in Europe. However, complying with such demands would violate local protection laws in Europe. Business continuity also hinges on the vendor’s ability to operate the region in a crisis. |
Generative AI and data platforms |
The AI Act requires auditable training data, risk logs and “explainability” controls, which transform model weights and datasets into intellectual property (IP). Regulators regard these elements as strategic assets. |
Workplace technology |
Suites such as Microsoft 365 or Google Workspace collect identity graphs, chat logs and telemetry. After Schrems II invalidated Privacy Shield, every cross-border transfer demands a Transfer Impact Assessment unless the destination country benefits from an EU adequacy decision. |
Digital sovereignty is best understood through four technical pillars, with security encompassing all of them. Deloitte’s Sovereignty Framework, which consists of 4+1 dimensions6, translates abstract principles into actionable questions that a board can address.
Pillar |
What it encompasses |
Key question |
Operations |
Autonomy from providers; ability to run services during outages or sanctions. |
Can we keep running if the provider is offline, sanctioned, or subpoenaed? |
Data |
Control over location, access, and encryption of data. |
Who can read, move, or delete our data, including backups and logs? |
Software |
Portability, IP ownership, freedom from vendor lock-in. |
Are our applications portable and our intellectual property protected? |
Infrastructure & Communications |
Control over physical and network infrastructure; reduced reliance on foreign tech. |
Is the underlying hardware, hypervisor, or network another single point of foreign control? |
Security (Cross-domain) |
Security controls across all pillars: encryption, IAM, secure development, trusted execution. |
Are security measures embedded across operations, data, software, and infrastructure? |
Each pillar represents a distinct aspect of sovereignty, so instead of pursuing a single score, organizations should decide how much control they need in each area. A spider chart effectively visualizes this by using each axis to represent a pillar, with the distance from the center showing the level of control. This approach simplifies this complex topic, facilitating a more business-oriented discussion.
There are three key steps to measuring sovereignty:
Sovereignty requires investment, but not everywhere, all the time. With budgets under pressure, organizations must focus on where control actually reduces risk. Below are four critical considerations to guide your decision-making:
a. Segment by risk, not ideology
Sovereign control should reflect business and regulatory exposure, not blanket rules. Classify workloads into three zones:
b. Use market offerings tactically
Sovereign-labeled services can help, but don’t assume they deliver real autonomy. Ask three questions:
If the answer to any is unclear, you have a dependency, not sovereignty.
c. Extend the lens to data sharing and AI
New rules blur internal vs. external data. The AI Act and Data Act will make logs, lineage, and consent records sensitive assets. Build architectures that:
d. Plan for shifting standards
Regulatory definitions of sovereignty are still evolving. The EUCS debate proves the need for flexibility. Adopt a “living roadmap” for sovereignty and review it annually to stay aligned without starting from scratch.
Digital sovereignty is no longer a buzzword, it is a tangible risk that demands attention at the board level. Organizations that define control objectives, score their estate, and invest where the blast radius is highest will turn compliance into competitive advantage.
Action plan for leaders
Despite challenges such as higher costs for sovereign regions, limited talent, and evolving regulations, by explicitly defining and measuring sovereignty, organizations can secure innovation on their own terms.