Sovereign cloud in Europe: residency is not the same as jurisdiction.
An EU datacenter tells you where the bytes sit. Sovereignty tells you which legal system can compel access to them. The two are not the same — and the gap is where the regulatory risk lives.
This page is the engineering perspective. If your DPO, your auditor or a procurement gate is asking what "sovereign" actually means in 2026, this is the version that holds up under scrutiny.
"Región UE" no es soberanía. Cuatro preguntas lo deciden.
La residencia de datos indica dónde están los bits. La soberanía indica qué sistema jurídico puede obligar al acceso. La respuesta debe cumplirse en los cuatro puntos — o el stack no es soberano.
¿Dónde se almacenan físicamente los datos?
No "en la nube" — qué datacenter, en qué país, bajo qué jurisdicción.
¿Quién más está en su ruta de datos?
Cada proveedor que toca los datos: el CDN, el relay de correo, el rastreador de errores, el pipeline de analítica.
¿Qué leyes pueden obligar a la divulgación?
Un proveedor con sede en EE. UU. está sujeto a la FISA 702 y la CLOUD Act — incluso cuando los datos están en Fráncfort.
¿Quién posee realmente las claves de cifrado?
Si el proveedor cloud tiene tanto los datos como las claves, puede leerlos — independientemente del DPA.
Falla en jurisdicción y custodia de claves.
Bits en la UE, matriz con sede en EE. UU., subprocesadores estadounidenses en la ruta por defecto, claves gestionadas por el proveedor.
Pasa en los cuatro.
Alojado en la UE sobre infraestructura con sede europea. Cero subprocesadores estadounidenses en la ruta por defecto. Claves del cliente o de un KMS europeo. Nombrados en su DPA del Artículo 28.
Residency vs. sovereignty: the distinction that decides everything
The cloud industry has spent fifteen years training buyers to ask the wrong question. "Where is the data hosted?" is a residency question. The answer can be technically correct and legally meaningless at the same time — because sovereignty is not about geography, it is about which courts can compel a provider to act.
An EU region on a US hyperscaler — AWS Frankfurt, Azure West Europe, GCP Belgium — keeps the bits in the EU. It does not remove the parent company from US jurisdiction. Under the US CLOUD Act (2018), a US-headquartered provider can be compelled to disclose customer data held anywhere in the world, including in EU regions. FISA 702 imposes the same exposure for the surveillance side. The European Data Protection Board has flagged this explicitly as a Schrems II problem.
"Sovereign" therefore means three concrete things, all at once:
- The legal entity holding your data has no parent in a third country with extraterritorial data-disclosure laws.
- No subprocessor in the data path is in such a country either.
- You — not the provider — control the encryption keys, or the keys live with a custodian outside the third country.
Pass all three and you have sovereignty. Fail any one and you have residency. The terminology in your DPA, your privacy policy and your customer-facing pages should reflect which one it actually is.
Why "EU subsidiary" is not the answer
A common workaround pitched by US hyperscalers is the EU subsidiary structure. Microsoft Ireland, AWS EMEA SARL, Google Cloud EMEA Ltd. The argument is that the European entity is the contracting counterparty under EU law.
This does not solve the jurisdictional problem. Under the CLOUD Act, the test is not which subsidiary signed the contract — it is whether the parent company has "possession, custody or control" of the data. A wholly owned EU subsidiary is, by design, controlled by the parent. The CJEU and EDPB analysis in Schrems II treats the parent's exposure as the operative one.
So when a vendor offers a "European" plan that is operated by an EU subsidiary of a US group, the right question to ask is: "Can your US parent company be compelled to instruct you to disclose data without our consent or knowledge?" The honest answer is yes.
The pseudo-sovereign middle tier
2024–2026 saw a wave of "sovereign" partnerships announced — typically a European systems integrator licensing the technology stack of a US hyperscaler and operating it under European management. Examples in the market today:
- T-Systems Open Sovereign Cloud — built on Google Cloud technology, operated by Deutsche Telekom subsidiary.
- Bleu — a French sovereign cloud built on Microsoft Azure technology, operated by Capgemini and Orange.
- S3NS — Thales × Google joint venture in France.
These offerings can be useful for specific compliance regimes, but they are not what an engineering team should call sovereign without qualification. The technology stack, the platform updates, the security patches and — crucially — the operational know-how originate from the US partner. In the worst-case threat model where the US side withdraws cooperation or is compelled to do so, the European operator inherits a stack they cannot independently maintain.
For most buyers, the cleaner architectural answer is to build on infrastructure where there is no US dependency in the supply chain at all. That is what we mean when we talk about a sovereign stack at Binadit.
What a sovereign EU stack actually looks like
Here is a concrete reference architecture for a mid-market SaaS or regulated workload running entirely under EU jurisdiction. None of these are exotic; all are production-grade.
- Compute & storage: Hetzner (DE), OVHcloud (FR), IONOS (DE), Scaleway (FR), Leaseweb (NL), UpCloud (FI), Exoscale (CH).
- Object storage: OVH Object Storage, Wasabi EU (operated from EU regions), self-hosted Ceph or MinIO on the above.
- CDN: Bunny.net (SI), KeyCDN (CH), or self-managed at the edge for full control.
- DNS: Hetzner DNS, Bunny DNS, Anycast DNS on EU infrastructure.
- Email delivery: Mailgun EU (with care — US parent), or fully EU options like Postmark EU, Mailpace, Tuta business, or self-hosted Postfix on the same infrastructure.
- Error tracking: Self-hosted GlitchTip or Sentry, or Sentry's EU-region deployment with the trade-offs documented.
- Analytics: Plausible (EU-hosted), Matomo (self-hosted or EU cloud), Pirsch.
- Observability: Self-hosted Prometheus + Grafana + Loki, or EU-managed equivalents (Grafana Cloud EU, Last9 with EU region).
- Key management: Hashicorp Vault on EU infra, or EU-managed KMS providers; for high-trust scenarios, on-premises HSM with cloud-side BYOK.
- CI/CD: GitLab self-hosted, Forgejo, Gitea, or GitLab.com EU instance — never the default github.com for code that touches personal data without supplementary measures.
The point is not that any one of these is "the" answer. The point is that the entire stack can be assembled with EU-headquartered providers, and a managed-infrastructure partner can run it for you the same way an AWS-native partner would run AWS.
The four-question test, in detail
1. Residency: where, exactly
Not "in the EU" — which datacenter, in which country, under which jurisdiction. EU is not a single legal regime; the GDPR is harmonised but the supervisory authority is local, and so is the legal recourse if a provider fails. Document the country code for primary, secondary and backup locations in your DPA.
2. Subprocessors: every one of them
In our audits of mid-market environments, the unmapped subprocessor chain is the single most common finding. The application is on EU infrastructure — good. But the image-optimisation API it calls is US-hosted. The transactional email is sent through a US ESP. The error tracker is the US default. The customer support widget loads JavaScript from a US CDN. Each is a separate data flow. Each needs a legal basis if data crosses to a third country.
A sovereign stack requires a complete subprocessor list — including the third-party APIs your application calls, not just the infrastructure providers. We publish ours by name on our about page, and append it to every DPA.
3. Jurisdiction: who can compel disclosure
The legal-process question. For each entity in your data path, identify the parent company's headquarters. If any parent is in the US, China, Russia or another country with extraterritorial data-access laws, that entity is exposed. EU subsidiary status of a US parent does not solve it.
This is where the architecture diagram becomes a legal document. Draw it once, review it quarterly.
4. Key custody: who can technically read the data
Encryption at rest is necessary but not sufficient. The question is who holds the keys. Provider-managed keys offer no protection against the provider being compelled to decrypt. BYOK (Bring Your Own Key) helps the compliance narrative; the provider still holds a runtime copy. HYOK (Hold Your Own Key) is the only model where the cloud provider physically cannot read the data without an active call to your key custodian. Pick the model the threat model demands.
The migration path: from AWS Frankfurt to a sovereign stack
The fear of moving off a hyperscaler is usually larger than the actual project. A typical mid-market migration runs in three phases:
- Inventory and audit (1–2 weeks). Map every data flow, identify every subprocessor, classify by US exposure. Output: a remediation list ranked by risk and migration complexity.
- Quick-win removals (2–4 weeks). Replace the soft dependencies first: error tracking, analytics, CDN, DNS, email. These move with little or no application change.
- Core migration (4–8 weeks). Compute, storage, database. Use streaming replication for zero-downtime database moves; use blue-green or DNS-failover patterns at the application tier. The hard part is rarely the technology — it is the choreography.
Total elapsed time for a 6–8 person engineering team with their day jobs to do: ten to sixteen weeks. With a managed-infrastructure partner driving the migration, four to twelve. The cost difference of running the sovereign stack vs the hyperscaler is — in our experience — neutral to negative for predictable workloads, modestly higher for spiky workloads, and significantly lower once egress and bandwidth are factored in.
"Is sovereign cloud more expensive?" — the honest answer
For 80% of mid-market workloads, the sovereign stack is cheaper over five years, mostly because EU providers do not charge punitive egress fees and because dedicated and bare-metal pricing is dramatically better than equivalent hyperscaler instance types. The cases where the sovereign stack is more expensive are: highly bursty workloads that benefit from sub-second autoscaling, workloads that lean on a specific managed service (DynamoDB, BigQuery, Lambda) that has no clean equivalent, and ML training workloads requiring a specific accelerator generation.
A competent engineering review will tell you in a week which category you are in. If you would like one, that is what we do for a living.
Regulatory tailwind: NIS2, DORA, EHDS, and AI Act
The regulatory direction of travel through 2025–2027 is towards stricter supply-chain accountability:
- NIS2 (Article 21): essential and important entities must conduct supply-chain risk assessments and contractually flow security obligations to subprocessors. A US-jurisdiction subprocessor is hard to defend in this assessment without supplementary measures.
- DORA (in force January 2025): financial entities must maintain a register of ICT third-party providers and an exit strategy for critical providers. The concentration risk language explicitly targets reliance on dominant non-EU providers.
- European Health Data Space (EHDS): secondary-use of health data is restricted to processing environments under EU jurisdiction.
- EU AI Act: high-risk AI systems require traceable training-data provenance — practically very difficult on a US foundation-model API.
None of these regulations ban US providers. They make the documentation and supplementary-measure burden high enough that, for most use cases, a sovereign stack is the lower-friction choice.
What we do not claim
For honesty: there are workloads where a sovereign EU stack is harder than a hyperscaler. Multi-region active-active with sub-50ms global latency. Specific managed analytics warehouses. Hyperscale ML inference on the latest accelerators. We will tell you when your workload falls in that category. For 90% of the SaaS, e-commerce, B2B platforms and regulated workloads we see, the sovereign stack is not just compliant — it is also faster, cheaper, and easier to reason about.
Where Binadit fits
We are an Article 28 data processor headquartered in Rotterdam, the Netherlands. Our infrastructure footprint is 100% on EU-headquartered providers. Our subprocessor list is published — see stack transparency — and the same list is appended to every DPA. We do not take engagements that would require a US-jurisdiction subprocessor in the default data path. Where a workload genuinely requires one (a third-party SaaS the customer insists on), we document it in writing, include the supplementary measures, and surface the residual risk to the DPO before signing.
If that sounds like the kind of partner you have been looking for, the next step is a 30-minute scoping call.
Related reading
Engineering reference
GDPR-compliant infrastructure: what it actually requires
Engineering reference
Why hosting location matters under GDPR
Engineering reference
EU data sovereignty explained for engineers
Engineering reference
Private cloud infrastructure
Engineering reference
Designing for regulatory compliance
Engineering reference
How US Cloud Act affects European businesses
Preguntas frecuentes
What is the difference between data residency and data sovereignty?
Residency is geographic — where data is physically stored. Sovereignty is jurisdictional — which legal system can compel access to that data. An AWS Frankfurt deployment achieves EU residency but not EU sovereignty: the parent company is US-headquartered and remains subject to the CLOUD Act and FISA 702. True sovereignty requires no third-country jurisdiction over any provider in the data path.
Does the EU-US Data Privacy Framework solve the sovereignty problem?
It is a transfer mechanism, not a sovereignty mechanism. The DPF reduces the legal friction of transferring data from the EU to the US, but it does not change the underlying jurisdictional exposure. Many EU data protection lawyers expect the DPF to be challenged in the same way Privacy Shield was. Architecturally, the safer position is to avoid the transfer in the first place.
Can we still use GitHub, Slack, Notion or other US SaaS tools?
Yes — for content that is not personal data of EU data subjects, or where the supplementary measures (encryption, pseudonymisation, contractual safeguards) are sufficient. The sovereignty principle applies to the data paths that carry personal data, not every tool your team uses. The discipline is to be explicit about which data flows where, and to document supplementary measures where there is third-country exposure.
Are sovereign cloud providers as reliable as AWS or Azure?
For the workloads we run on them, yes. Hetzner, OVH, Leaseweb, IONOS and Scaleway all operate Tier III+ datacenters with multi-AZ designs comparable to hyperscaler EU regions. The differences are in the breadth of managed services, not in raw reliability. A managed-infrastructure partner closes the managed-service gap by operating the equivalent layer themselves.
How does this interact with NIS2 and DORA?
Both frameworks require active supply-chain risk management and, in the case of DORA, an explicit register and exit plan for critical ICT third-party providers. Documenting a sovereign stack — where every subprocessor is named and EU-jurisdictional — significantly simplifies both. The same is true for ISO 27001 supplier-management controls and SOC 2 vendor-risk requirements.
Do you accept clients from outside the EU?
We work with EU-based clients and with non-EU clients whose end-users or data subjects are in the EU. We do not take engagements that would require us to operate a US-jurisdiction data path in the default architecture. If your business model requires running infrastructure under US jurisdiction, we are not the right partner — and we will say so before the first paid scope.
What does GAIA-X actually certify?
GAIA-X is a federation framework, not a single label. It defines a set of trust criteria — including jurisdiction, transparency and portability — that participants self-certify against, with audit verification. A GAIA-X label is useful as a procurement signal, particularly in public sector tenders. It is not a substitute for reading the underlying compliance documentation, but it makes the conversation faster.
Build a sovereign stack with engineers, not lawyers.
Audit of your current data paths, architecture proposal with a clean EU-only subprocessor chain, zero-downtime migration. All in-house, all under Dutch jurisdiction.
Request a sovereignty audit