Data Sovereignty: What It Means, Why It Matters, and How European Companies Achieve It
2026-03-07
By Orbiq Team

Data Sovereignty: What It Means, Why It Matters, and How European Companies Achieve It

A practical guide to data sovereignty — what it is, how it differs from data residency and data localisation, why EU regulations demand it, and how European companies ensure sovereign control over their data.

Data Sovereignty
Data Residency
GDPR
NIS2
DORA
Cloud Security
European Compliance

Data Sovereignty: What It Means, Why It Matters, and How European Companies Achieve It

Data sovereignty is the principle that data is subject to the laws and governance structures of the jurisdiction where it is collected or stored. For European companies, this means ensuring that data remains under EU legal authority — not just physically located in Europe, but legally protected from foreign government access and governed by European regulations.

The concept has moved from a theoretical concern to a practical business requirement. Enterprise buyers in Europe now routinely ask vendors about data sovereignty as part of procurement. Regulations like GDPR, NIS2, and DORA create legal obligations around jurisdictional control. And high-profile legal cases — most notably the Schrems decisions — have demonstrated that physical location alone does not guarantee legal protection.

This guide covers what data sovereignty means in practice, how it differs from related concepts, why it matters for European businesses, and how to achieve it.


Data Sovereignty vs. Data Residency vs. Data Localisation

These three terms are often confused. They represent different levels of data control:

Data Residency

Data residency means data is stored in a specific geographic location. A company might require "EU data residency," meaning all data must be stored in data centres physically located within the European Union.

What it guarantees: Physical location of data storage.

What it does not guarantee: Legal protection from foreign jurisdiction. A US cloud provider operating an EU data centre still stores data in the EU, but remains subject to US law.

Data Localisation

Data localisation requires data to remain within specific national borders. Some countries mandate that certain types of data (e.g., financial records, health data, government data) cannot leave the country under any circumstances.

What it guarantees: Data never crosses national borders.

What it does not guarantee: Practical for most businesses. Strict localisation can limit cloud provider options and increase costs significantly.

Data Sovereignty

Data sovereignty ensures data is subject to the legal framework of a specific jurisdiction. It is the most comprehensive concept, encompassing both physical location and legal control.

What it guarantees: Jurisdictional authority over data, legal protection, and governance control.

What it requires: Choosing providers, infrastructure, and legal arrangements that ensure no foreign government can compel data access without following the governing jurisdiction's legal process.

AspectData ResidencyData LocalisationData Sovereignty
FocusWhere data is storedPreventing cross-border transfersLegal jurisdiction over data
ScopeGeographicNationalLegal and jurisdictional
Provider restrictionMust have local data centresMust store locally, no transfersMust be subject to local law
Practical impactModerateHigh (limits options)Highest (requires legal analysis)
Common requirementGDPR, industry standardsSpecific national lawsEnterprise buyers, regulated sectors

Why Data Sovereignty Matters

The CLOUD Act Problem

The US Clarifying Lawful Overseas Use of Data (CLOUD) Act, enacted in 2018, allows US law enforcement to compel US-headquartered companies to provide data stored on their servers, regardless of where that data is physically located. This applies to:

  • AWS, Azure, Google Cloud — even when operating EU data centres
  • US-headquartered SaaS providers processing EU data
  • Any company incorporated in the US or with substantial US operations

For European companies storing sensitive data with US providers, this creates a fundamental tension: GDPR restricts data access by foreign governments, but the CLOUD Act may compel it.

The Schrems Legacy

The Schrems I (2015) and Schrems II (2020) decisions by the Court of Justice of the European Union (CJEU) invalidated successive EU-US data transfer frameworks — first Safe Harbor, then Privacy Shield — on the grounds that US surveillance laws did not provide adequate protection for EU personal data.

While the EU-US Data Privacy Framework (2023) provides a current legal basis for transfers, the underlying tension remains: US surveillance capabilities and legal authorities have not fundamentally changed.

Regulatory Requirements

European regulations increasingly require sovereignty considerations:

  • GDPR (Articles 44-49): Restricts international data transfers and requires adequate safeguards
  • NIS2 (Article 21(2)(d)): Supply chain security must consider jurisdictional risks
  • DORA (Articles 28-44): ICT third-party risk management includes concentration risk and jurisdictional assessment
  • National laws: Some EU member states have additional sovereignty requirements for specific sectors (e.g., health data in France, financial data in Germany)

Enterprise Buyer Requirements

European enterprise buyers increasingly evaluate data sovereignty as part of vendor assessment:

  • Where is data stored and processed?
  • What legal jurisdiction governs the cloud provider?
  • Can foreign governments compel data access?
  • Who controls encryption keys?
  • What sub-processors are used and where are they incorporated?

These questions appear in security questionnaires, vendor risk assessments, and procurement requirements across industries.


Achieving Data Sovereignty in Practice

Infrastructure Choices

European sovereign cloud providers: OVHcloud, IONOS, Hetzner, Scaleway, Open Telekom Cloud, and others are incorporated in the EU and subject only to EU law.

US hyperscaler sovereign offerings: AWS European Sovereign Cloud, Google Sovereign Cloud, and Microsoft Cloud for Sovereignty provide operational separation within EU borders, EU-resident staff, and local key management — but the underlying corporate entity remains subject to US law.

Hybrid approaches: Use EU sovereign providers for sensitive data while leveraging hyperscalers for less sensitive workloads where their advanced services provide significant value.

Encryption and Key Management

Encryption is a critical sovereignty control:

  • Customer-managed keys (CMK): The customer controls encryption keys, meaning even the cloud provider cannot access data
  • Bring Your Own Key (BYOK): Customer generates and manages the master key used to encrypt data keys
  • External Key Management (EKM): Keys are stored and managed in a customer-controlled HSM outside the cloud provider's infrastructure
  • Confidential computing: Data is encrypted even during processing, using hardware-based trusted execution environments

When the customer controls encryption keys and the cloud provider cannot access data in plaintext, foreign legal compulsion becomes technically unenforceable — the provider cannot provide what it cannot access.

Legal and Contractual Measures

  • Data Processing Agreements (DPAs): Include sovereignty clauses specifying governing law and jurisdictional limitations
  • Standard Contractual Clauses (SCCs): Use EU-approved SCCs for any transfers outside the EU
  • Transfer Impact Assessments (TIAs): Document the legal landscape of destination countries and supplementary measures
  • Binding Corporate Rules (BCRs): For multinational organisations transferring data within the corporate group
  • Sovereignty addenda: Additional contractual commitments from cloud providers regarding data access limitations

Organisational Measures

  • Data classification: Identify which data requires sovereign treatment based on sensitivity, regulatory requirements, and business risk
  • Sub-processor governance: Evaluate the jurisdictional exposure of all sub-processors in the supply chain
  • Incident response: Ensure incident notification follows the governing jurisdiction's requirements (e.g., GDPR Article 33, NIS2 Article 23)
  • Regular review: Sovereignty requirements evolve with legislation and case law — review arrangements annually

GAIA-X and European Cloud Standards

GAIA-X is a European initiative to create a federated, sovereign data infrastructure. Key elements:

GAIA-X Labels

GAIA-X defines trust levels through labelling:

  • GAIA-X Standard: Basic compliance with transparency and interoperability requirements
  • European Data Protection: Meets GDPR requirements with EU data processing
  • Sovereign Data Exchange: Full sovereignty guarantees including jurisdiction, transparency, and portability

GAIA-X Principles

  • Transparency: Clear disclosure of data processing locations, sub-processors, and applicable laws
  • Data portability: Ability to move data between providers without lock-in
  • Interoperability: Standards-based interfaces enabling multi-cloud architectures
  • Self-sovereignty: Organisations retain control over their data and the rules governing its use
  • Federation: Distributed infrastructure avoiding single points of control

Practical Impact

GAIA-X certification is becoming a differentiator for European cloud providers and SaaS companies. Enterprise buyers — particularly in regulated sectors — increasingly reference GAIA-X standards in procurement requirements.


Data Sovereignty by Regulation

GDPR

RequirementSovereignty Implication
Article 44: Transfers subject to Chapter VMust assess legal framework of destination country
Article 45: Adequacy decisionsOnly transfer freely to countries with adequate protection
Article 46: Appropriate safeguardsSCCs, BCRs required for non-adequate countries
Article 49: DerogationsLimited exceptions for necessary transfers
Schrems II: TIA requirementMust assess surveillance laws of destination country

NIS2

RequirementSovereignty Implication
Article 21(2)(d): Supply chain securityEvaluate jurisdictional risks of ICT providers
Article 21(2)(j): Cryptography policiesEncryption key management must ensure sovereignty
Article 23: Incident notificationReporting obligations follow EU jurisdiction

DORA

RequirementSovereignty Implication
Article 28: ICT third-party risk policyMust assess concentration and jurisdictional risk
Article 30: Key contractual provisionsContracts must address data location and protection
Article 31: Sub-outsourcing conditionsSovereignty requirements cascade through supply chain

Common Data Sovereignty Mistakes

Confusing Location with Sovereignty

Storing data in an EU data centre operated by a US provider does not automatically achieve data sovereignty. The provider's corporate jurisdiction matters as much as the data centre location.

Ignoring Sub-Processors

Your primary cloud provider may be EU-sovereign, but if they use sub-processors subject to foreign law, your sovereignty chain is broken. Evaluate the entire supply chain.

Relying Solely on Contracts

Contractual commitments from providers are important but may not withstand foreign government legal orders. Technical measures (encryption, key management) provide stronger sovereignty guarantees than contracts alone.

Over-Engineering Sovereignty

Not all data requires sovereign treatment. Classify data by sensitivity and apply sovereignty controls proportionally. Marketing analytics data does not need the same sovereignty treatment as patient health records.

Assuming Permanent Adequacy

Adequacy decisions can be invalidated (as Schrems demonstrated). Design sovereignty architectures that are resilient to changes in the legal landscape, not dependent on specific adequacy decisions.


How Orbiq Supports Data Sovereignty

  • Trust Center: Publish your data sovereignty posture — data residency, encryption, key management, and provider jurisdictions — so buyers can self-serve their due diligence
  • Continuous Monitoring: Track sovereignty-relevant controls across ISO 27001, GDPR, NIS2, and DORA requirements
  • Evidence Management: Centralize Transfer Impact Assessments, sub-processor documentation, and sovereignty certifications
  • AI-Powered Questionnaires: Auto-respond to sovereignty-related security questionnaire questions from your documented controls

Further Reading


This guide is maintained by the Orbiq team. Last updated: March 2026.