Sovereign cloud in Europe: residency is not the same as jurisdiction.

An EU datacenter tells you where the bytes sit. Sovereignty tells you which legal system can compel access to them. The two are not the same — and the gap is where the regulatory risk lives.

This page is the engineering perspective. If your DPO, your auditor or a procurement gate is asking what "sovereign" actually means in 2026, this is the version that holds up under scrutiny.

"Region UE" to nie suwerenność. Decydują cztery pytania.

Rezydencja danych mówi, gdzie znajdują się bity. Suwerenność mówi, który system prawny może wymusić dostęp. Odpowiedź musi być spójna we wszystkich czterech — w przeciwnym razie stack nie jest suwerenny.

Rezydencja

Gdzie dane są fizycznie przechowywane?

Nie "w chmurze" — które centrum danych, w którym kraju, pod którą jurysdykcją.

Podprzetwarzający

Kto jeszcze znajduje się w Państwa ścieżce danych?

Każdy dostawca dotykający danych: CDN, przekaźnik e-mail, tracker błędów, pipeline analityczny.

Jurysdykcja

Czyje prawa mogą wymusić ujawnienie?

Dostawca z siedzibą w USA podlega FISA 702 i ustawie CLOUD Act — nawet gdy dane znajdują się we Frankfurcie.

Depozyt kluczy

Kto faktycznie ma klucze szyfrujące?

Jeśli dostawca chmury ma zarówno dane, jak i klucze, może je odczytać — niezależnie od DPA.

AWS · Azure · GCP — EU region

Nie spełnia kryterium jurysdykcji i depozytu kluczy.

Bity w UE, spółka matka w USA, podprzetwarzający z USA w domyślnej ścieżce, klucze zarządzane przez dostawcę.

Stack zarządzany przez Binadit

Spełnia wszystkie cztery kryteria.

Hostowane w UE na infrastrukturze z siedzibą europejską. Zero podprzetwarzających z USA w domyślnej ścieżce. Klucze klienta lub europejskiego KMS. Wymienieni z nazwy w Państwa DPA z Artykułu 28.

Często zadawane pytania

What is the difference between data residency and data sovereignty?

Residency is geographic — where data is physically stored. Sovereignty is jurisdictional — which legal system can compel access to that data. An AWS Frankfurt deployment achieves EU residency but not EU sovereignty: the parent company is US-headquartered and remains subject to the CLOUD Act and FISA 702. True sovereignty requires no third-country jurisdiction over any provider in the data path.

Does the EU-US Data Privacy Framework solve the sovereignty problem?

It is a transfer mechanism, not a sovereignty mechanism. The DPF reduces the legal friction of transferring data from the EU to the US, but it does not change the underlying jurisdictional exposure. Many EU data protection lawyers expect the DPF to be challenged in the same way Privacy Shield was. Architecturally, the safer position is to avoid the transfer in the first place.

Can we still use GitHub, Slack, Notion or other US SaaS tools?

Yes — for content that is not personal data of EU data subjects, or where the supplementary measures (encryption, pseudonymisation, contractual safeguards) are sufficient. The sovereignty principle applies to the data paths that carry personal data, not every tool your team uses. The discipline is to be explicit about which data flows where, and to document supplementary measures where there is third-country exposure.

Are sovereign cloud providers as reliable as AWS or Azure?

For the workloads we run on them, yes. Hetzner, OVH, Leaseweb, IONOS and Scaleway all operate Tier III+ datacenters with multi-AZ designs comparable to hyperscaler EU regions. The differences are in the breadth of managed services, not in raw reliability. A managed-infrastructure partner closes the managed-service gap by operating the equivalent layer themselves.

How does this interact with NIS2 and DORA?

Both frameworks require active supply-chain risk management and, in the case of DORA, an explicit register and exit plan for critical ICT third-party providers. Documenting a sovereign stack — where every subprocessor is named and EU-jurisdictional — significantly simplifies both. The same is true for ISO 27001 supplier-management controls and SOC 2 vendor-risk requirements.

Do you accept clients from outside the EU?

We work with EU-based clients and with non-EU clients whose end-users or data subjects are in the EU. We do not take engagements that would require us to operate a US-jurisdiction data path in the default architecture. If your business model requires running infrastructure under US jurisdiction, we are not the right partner — and we will say so before the first paid scope.

What does GAIA-X actually certify?

GAIA-X is a federation framework, not a single label. It defines a set of trust criteria — including jurisdiction, transparency and portability — that participants self-certify against, with audit verification. A GAIA-X label is useful as a procurement signal, particularly in public sector tenders. It is not a substitute for reading the underlying compliance documentation, but it makes the conversation faster.

Build a sovereign stack with engineers, not lawyers.

Audit of your current data paths, architecture proposal with a clean EU-only subprocessor chain, zero-downtime migration. All in-house, all under Dutch jurisdiction.

Request a sovereignty audit