Sovereign Digital Cloud · Decision-Maker Level Framework

Digital Sovereignty
Audit Framework

A structured, vendor-neutral scoring methodology for CEO and CTO-level executives evaluating sovereignty risk across their infrastructure, data, and AI stack. 9 categories. 60+ controls. Objective weighted scoring.

Definition

What Sovereignty Actually Means

Sovereign: "having the highest power or being completely independent." Applied to cloud infrastructure, it means one thing — you are the ultimate decision-maker at every layer.

The most dangerous misconception in the market today is that "having a server in your region" equals sovereignty. It does not. Data residency addresses one slice of one dimension. Genuine sovereignty means you are the decision-maker across all seven control dimensions.

The 7 Control Dimensions of Sovereign Infrastructure

For each dimension, ask: who is the ultimate decision-maker — you, or someone else?

Control Dimension What you must control Hyperscaler "Sovereign Cloud" True Sovereign Infrastructure
Data Centre
Physical control
Physical access, security policy, who enters, on-site audit rights Vendor's facility. You have never seen it. You decide nothing about who enters. Your facility or directly contracted co-lo. You set access policy. You hold audit rights.
Network
Traffic control
Switches, routers, BGP peering, firewall rules, VPN topology Vendor's SDN. You configure settings in their console; the underlying network is theirs. Your switches, your BGP peers, your ISP contracts. Every routing decision is yours.
Hardware
Physical asset control
Servers, CPUs, GPUs, firmware baselines, supply chain provenance Vendor's servers — unknown provenance, unverifiable firmware, shared tenants. Your hardware. Verified supply chain. Locked firmware baselines.
Setup
Configuration control
Architecture design, software stack, configuration decisions You configure settings inside the vendor's console. Architecture is their template. You designed it. Every choice declared as code you own and version-control.
Operation
Access & people control
Who has access, under what conditions, with what logging Vendor staff operate your infrastructure. They access it without prior notification. Your operations team. Every session is cryptographically logged. You authorise it.
Roadmap
Feature & software control
Software versions, updates, features, deprecation schedule Features appear and disappear based on vendor's commercial priorities. Open-source stack. You control the version, update schedule, and feature set.
Vendors
Supply chain control
Right to change any supplier without losing access to your systems One vendor. Switching costs are prohibitive by design. You are captured. Open standards throughout. You can replace any component.

A hyperscaler "sovereign cloud" region addresses one narrow slice — where data is stored. The other six dimensions remain 100% under vendor control. That is not sovereignty. That is a preference setting with a national flag on it.

Context

Why We Built This Framework

Every hyperscaler and commercial vendor now claims to offer "sovereign cloud." It has become a marketing label — used by the very organisations whose business model depends on you remaining dependent on them.

A truly sovereign infrastructure posture cannot be self-certified by a vendor who profits from your dependency. It requires an independent, structured assessment against clear, auditable controls.

This framework was developed from over a decade of deploying private infrastructure for governments and regulated enterprise. Use it as a self-assessment, a vendor evaluation tool, or the basis for a formal infrastructure audit.

Framework at a Glance

9
Categories
60+
Controls
100%
Weighted Score
3-way
Comparison

Who Should Use This

  • CIOs and CTOs evaluating cloud strategy
  • Government ministries assessing digital risk
  • Boards conducting infrastructure due diligence
  • Procurement teams evaluating cloud vendor bids
  • Risk & compliance officers in regulated sectors
  • Security architects designing sovereign posture
Methodology

How the Scoring Works

Each control is scored Yes (1.0), Partial (0.5), or No (0). Category scores are multiplied by the category weight. Final score is a percentage from 0 to 100.

1.0

Yes / Fully Met

Fully implemented and independently verifiable. No vendor dependency.

0.5

Partial / Mixed

Partially met — reliant on vendor SLA assurances, contractual clauses, or third-party tooling.

0.0

No / Not Met

Not met. A third party holds control, jurisdiction, or capability that you do not.

Score Range Rating Interpretation
85 - 100 Sovereign Robust sovereign posture. Infrastructure under genuine organisational control across all key categories.
65 - 84 Partial Control Material sovereign gaps exist. CLOUD Act exposure, data residency, and operational dependency need remediation.
40 - 64 At Risk Significant sovereign exposure. High dependency on third parties for core infrastructure.
Below 40 Critical Risk Critical sovereign risk. The organisation does not meaningfully control its own infrastructure. Immediate strategic review required.
9-Category Framework

The Complete Control Categories

Every category comes with its full weighting, key controls, and the risk exposure if the category is failed.

Category 01

Operational Control

Weight: 20%

Key Controls

  • You hold full administrative access to the control plane
  • No vendor can disable, throttle or terminate your environment
  • You can add/remove capacity without vendor approval
  • Hypervisor and hardware are under your physical control
  • No remote kill-switch or "phone home" telemetry

Risk If Failed

A vendor can unilaterally suspend your infrastructure. In a sanctions event, your infrastructure disappears overnight with no recourse.

Public Cloud Score: 0/20 — Vendor controls the control plane by design.

Category 02

Data Sovereignty

Weight: 20%

Key Controls

  • Exact physical location of all data is known and controlled
  • Data does not cross a jurisdictional boundary without your approval
  • You control where backups, replicas and snapshots reside
  • No third-party access to data without documented audit trail
  • Metadata, access logs and analytics are also held in-jurisdiction

Risk If Failed

GDPR violations, CLOUD Act exposure, and sector-specific compliance breaches. Your regulated data may be accessible to foreign intelligence agencies under domestic US law.

Public Cloud Score: 0-5/20 — CLOUD Act applies regardless of region.

Category 03

Security Sovereignty

Weight: 15%
  • Encryption keys generated and held by your organisation
  • PKI infrastructure operated internally
  • Incident response does not require vendor involvement
  • Security audit logs stored independently of the cloud vendor
  • Penetration testing without vendor approval

Vendor-held encryption keys create a fundamental key escrow risk. Cloud HSM "customer-managed" keys are still on vendor hardware. A supply-chain compromise of the vendor's KMS could expose all encrypted data.

Category 04

Survivability

Weight: 15%
  • Operations continue if vendor declares bankruptcy
  • Vendor sanctions do not immediately terminate your service
  • Data can be exported and migrated within 72 hours
  • Runbooks exist for multi-site failover without third-party dependency
  • Proprietary API usage documented with open alternatives identified

A vendor EOL, sanctions event, or financial collapse leaves your critical services unrecoverable. Cloud egress costs and proprietary API lock-in deliberately make migration prohibitively expensive — by design.

Category 05

AI & Model Sovereignty

Weight: 10%
  • AI/LLM inference runs within your own infrastructure
  • Training data never leaves your environment
  • Models can be inspected, audited and modified
  • No API dependency on a commercial model vendor
  • Open-weight models with permissive licences

Every prompt sent to a commercial AI API is potentially logged, retained, and used for model training. Classified data processed through API-based AI represents a severe information sovereignty breach.

Category 06 · 5%

Open Source Freedom

Does your stack run on community-governed open-source? Or on proprietary forks controlled by a single vendor's commercial roadmap?

Category 07 · 5%

Feature & Roadmap Control

Can you fork the codebase if required? Or does a vendor's product roadmap dictate what features exist and when?

Category 08 · 5%

Legal & Compliance

Are you exposed to extra-territorial legislation? The US CLOUD Act, UK IPA, and similar statutes allow compelled disclosure regardless of where data physically resides.

Category 09 · 5%

Replication & Cost Independence

If costs triple overnight, can you replicate the entire stack elsewhere at zero additional licensing cost? Open-source infrastructure carries no per-instance fees.

Indicative Results

How the Models Compare

Indicative scores based on a typical deployment scenario.

Private Infrastructure
94
Sovereign
Hybrid Cloud
58
At Risk
Public Cloud (AWS/GCP/Azure)
18
Critical Risk
Control Category Private Infrastructure Public Cloud Hybrid Cloud
Operational Control 20% 20/20 — Full admin control 0/20 — Vendor controls control plane 10/20 — Mixed
Data Sovereignty 20% 20/20 — Known location, no CLOUD Act 2/20 — CLOUD Act applies 12/20 — On-prem portion sovereign
Security Sovereignty 15% 14/15 — Own KMS, PKI, firewall 5/15 — Vendor-managed HSM 9/15 — Varies by placement
Survivability 15% 14/15 — Fully operable independently 3/15 — Proprietary lock-in 9/15 — Private portion survivable
AI & Model Sovereignty 10% 10/10 — On-prem GPU, open models 2/10 — API logs, data transmitted 6/10 — Depends on AI placement
Open Source Freedom 5% 5/5 2/5 3/5
Feature & Roadmap 5% 5/5 1/5 3/5
Legal & Compliance 5% 5/5 1/5 3/5
Replication & Cost 5% 5/5 2/5 3/5

Indicative scores based on typical configuration. Actual scores depend on your specific contracts, architecture, and jurisdiction.

Request a Bespoke Sovereignty Assessment

Our engineers can conduct a full sovereignty assessment against the 60-control framework — tailored to your specific infrastructure, regulatory context, and risk profile.