Skip to content

Navigation

AI
  • Our approach

    • News and insights
    • Technical blog
    • Research
    • Live AI events
    • Explore AI at Red Hat
  • Our portfolio

    • Red Hat AI
    • Red Hat Enterprise Linux AI
    • Red Hat OpenShift AI
    • Red Hat AI Inference Server New
  • Engage & learn

    • AI learning hub
    • AI partners
    • Services for AI
Hybrid cloud
  • Platform solutions

    • Artificial intelligence

      Build, deploy, and monitor AI models and apps.

    • Linux standardization

      Get consistency across operating environments.

    • Application development

      Simplify the way you build, deploy, and manage apps.

    • Automation

      Scale automation and unite tech, teams, and environments.

    • Explore solutions
  • Use cases

    • Virtualization

      Modernize operations for virtualized and containerized workloads.

    • Digital sovereignty

      Control and protect critical infrastructure.

    • Security

      Code, build, deploy, and monitor security-focused software.

    • Edge computing

      Deploy workloads closer to the source with edge technology.

  • Solutions by industry

    • Automotive
    • Financial services
    • Healthcare
    • Industrial sector
    • Media and entertainment
    • Public sector
    • Telecommunications

Discover cloud technologies

Learn how to use our cloud products and solutions at your own pace in the Red Hat® Hybrid Cloud Console.

Products
  • Platforms

    • Red Hat AI

      Develop and deploy AI solutions across the hybrid cloud.

    • Red Hat Enterprise Linux

      Support hybrid cloud innovation on a flexible operating system.

      New version
    • Red Hat OpenShift

      Build, modernize, and deploy apps at scale.

    • Red Hat Ansible Automation Platform

      Implement enterprise-wide automation.

  • Featured

    • Red Hat OpenShift Virtualization Engine
    • Red Hat OpenShift Service on AWS
    • Microsoft Azure Red Hat OpenShift
    • See all products
  • Try & buy

    • Start a trial
    • Buy online
    • Integrate with major cloud providers
  • Services & support

    • Consulting
    • Product support
    • Services for AI
    • Technical Account Management
    • Explore services
Training
  • Training & certification

    • Courses and exams
    • Certifications
    • Red Hat Academy
    • Learning community
    • Learning subscription
    • Explore training
  • Featured

    • Red Hat Certified System Administrator exam
    • Red Hat System Administration I
    • Red Hat Learning Subscription trial (No cost)
    • Red Hat Certified Engineer exam
    • Red Hat Certified OpenShift Administrator exam
  • Services

    • Consulting
    • Partner training
    • Product support
    • Services for AI
    • Technical Account Management
Learn
  • Build your skills

    • Documentation
    • Hands-on labs
    • Hybrid cloud learning hub
    • Interactive learning experiences
    • Training and certification
  • More ways to learn

    • Blog
    • Events and webinars
    • Podcasts and video series
    • Red Hat TV
    • Resource library

For developers

Discover resources and tools to help you build, deliver, and manage cloud-native applications and services.

Partners
  • For customers

    • Our partners
    • Red Hat Ecosystem Catalog
    • Find a partner
  • For partners

    • Partner Connect
    • Become a partner
    • Training
    • Support
    • Access the partner portal

Build solutions powered by trusted partners

Find solutions from our collaborative community of experts and technologies in the Red Hat® Ecosystem Catalog.

Search

I'd like to:

  • Start a trial
  • Manage subscriptions
  • See Red Hat jobs
  • Explore tech topics
  • Contact sales
  • Contact customer service

Help me find:

  • Documentation
  • Developer resources
  • Skills assessments
  • Architecture center
  • Security updates
  • Support cases

I want to learn more about:

  • AI
  • Application modernization
  • Automation
  • Cloud-native applications
  • Linux
  • Virtualization
ConsoleDocsSupportNew For you

Recommended

We'll recommend resources you may like as you browse. Try these suggestions for now.

  • Product trial center
  • Courses and exams
  • All products
  • Tech topics
  • Resource library
Log in

Sign in or create an account to get more from Red Hat

  • World-class support
  • Training resources
  • Product trials
  • Console access

A subscription may be required for some services.

Log in or register
Contact us
  • Home
  • Resources
  • Elements of cloud sovereignty

Elements of cloud sovereignty

July 29, 2025•
Resource type: Overview
Download PDF

The sovereign challenge

Organizations are increasingly recognizing the need for digital sovereignty, which is the ability of a nation or organization to independently control and protect its critical digital infrastructure in alignment with its policies, values, and strategic objectives. The need for digital sovereignty is prompted by regulatory compliance, geopolitical uncertainty, security concerns, and the desire for greater control over data and technology. Implementing a sovereign cloud is one way to help meet these requirements, particularly for sensitive data and workloads that could have severe consequences if leaked or compromised. 

A sovereign cloud is an environment designed to adhere to a nation's data residency, operational independence, and regulatory compliance mandates, ensuring that all data, applications, and operations remain within its borders and under its control. 

A sovereign cloud environment goes beyond data residency, which is typically maintained within a jurisdictional, often national, compliance boundary. It also involves using in-country datacenters, geo-fencing policies for data localization, maintaining operational independence through local staffing and supply chain control, workload protection, access control, and auditing. While many of these elements are already in place, meeting and documenting sovereignty requirements while keeping the agility and flexibility of a cloud-native experience remains a challenge. 

In addition, sovereignty emphasizes strong isolation from external dependencies, built-in regulatory compliance tools, transparency in data flow, secure connectivity, and scalable, resilient infrastructure, all working in concert to safeguard critical national infrastructure and foster trust. A sovereign cloud provides the nimbleness, innovation, and cost savings of a traditional cloud environment while addressing concerns about data extraterritoriality, foreign government access, and control over critical national infrastructure. 

diagram of digital sovereignty broken down into three core pillars: Data sovereignty, Technology sovereignty, and Operational sovereignty.

Figure 1. FAQs about digital sovereignty

The boundaries between data, technology, and operational sovereignty are not hard lines; in fact, they are actually intertwined. For example, data sovereignty focuses on data location and access, while technology sovereignty broadens the scope to encompass the entire technology stack, including hardware, software, and services.

Data sovereignty 

While data sovereignty is, at times, defined as solely a nationalistic concern influenced by the need to prioritize products and services made in a country, it can also be viewed as a requirement for control, specifically over data sharing, where data is located, transmitted, and used. This necessitates that data and support personnel be located within specific national or regional boundaries. Additionally, operational independence, continuity in disconnected environments, and trusted software provenance are key customer expectations for data sovereignty.

Technology sovereignty

Technology sovereignty is predicated on the application of key control requirements. Nearly every organization is already taking advantage of some level of access management and security protocols, and the requirements for technology sovereignty stress how these controls interact with critical technologies and data, extending beyond traditional authentication to ensure verifiable trust in code artifacts and reproducible builds. The aim is to protect organizations against hidden backdoors or vulnerabilities that could be exploited by external actors. 

Operational sovereignty

Technology sovereignty necessitates operational independence and continuity, even in the face of geopolitical instability or restrictions. It may include running systems in disconnected or air-gapped environments to keep critical services available regardless of internet access or supply chain issues. It also involves localized support and guarantees operational continuity, allowing organizations to maintain activities and deliver services without relying on external, potentially compromised entities.

Model for sovereign cloud

There are numerous potential architectures for addressing the sovereignty requirements of a nation or organization’s infrastructure. Simply put, a sovereign architecture must provide control and transparency over core services, such as networking, fleet management, automation, and key management, while also ensuring control and isolation. The diagram below provides a high-level view of the key elements required when architecting a sovereign cloud. 

a layered architectural diagram for a sovereign cloud environment, showing the technology stack from the foundational hardware and physical infrastructure up to the cloud infrastructure layer. At the top, it details the

Figure 2. Key requirements for sovereign cloud

Let us look a little deeper into the key areas influencing the need for a sovereign cloud and how Red Hat is helping our customers meet sovereign requirements.

Inside the sovereign border

At the heart of a sovereignty cloud is the notion of autonomy, where all or nearly all technology elements reside inside the organization's or nation's borders. To put it simply, cloud sovereignty requires that foundational infrastructure, including storage, compute, network, hardware, and supporting operations, be physically located in the country or region of residence. 

Cloud infrastructure

Cloud infrastructure is paramount to sovereignty, influenced by the need for data and operational control. Due to data residency requirements, organizations will seek to choose cloud providers with datacenters in specific jurisdictions, whether they are global giants like Amazon Web Services (AWS), Azure, and Google Cloud, or specialized local providers.

Deciding between single and multitenancy models impacts sovereignty. Single-tenancy, preferred for strict needs, offers more isolation with dedicated resources. Multitenancy is cost-effective, but it raises concerns about shared infrastructure. The choice depends on an organization's needs for data location, access, independence, and trust in the software supply chain, all of which are crucial for true cloud sovereignty.

Sovereign controls 

A set of sovereign controls can be applied at the organizational level. These controls are requirements that all sovereign clouds use. Organizations need the ability to make precise decisions regarding the physical location of their infrastructure and to control who can access their systems and data. This level of control extends to operational processes like disaster recovery (DR), incident management, data retention, and auditing. While certainly not an exhaustive list, these sovereign controls can include:

  • Data encryption. This ensures data remains encrypted and protected even while in use by isolating it from the underlying infrastructure (i.e., confidential computing).
  • External key management. Helps organizations maintain full control over encryption keys, which are often stored on their own hardware or with a trusted third party, separate from the cloud provider.
  • Access and identity management. Provides granular control over who can access systems and data, including specific national or regional personnel requirements.
  • Audit management. Allows comprehensive logging and monitoring of all activities, ensuring transparency and accountability for data access and system changes.
  • Software supply chain security. This ensures the integrity and provenance of all software components, preventing hidden backdoors or vulnerabilities through measures like reproducible builds and geographic signing.
  • Workload protection. Secures applications and data throughout their lifecycle, including in disconnected environments, ensuring operational independence and continuity.
  • Data residency protection. Mandates that data is stored and processed within specific national or regional geographic boundaries, adhering to local laws and jurisdictional requirements.

Who is involved, and what steps are needed to deliver sovereign controls

The infrastructure and tools needed to deliver a business function, while remaining compliant with sovereign regulations, require collaboration across the organization. For platform engineering teams seeking to design and implement a comprehensive range of sovereign controls, the work begins with understanding and documenting the various requirements. Information security (Infosec) teams, along with risk and compliance, are a critical component to building this understanding, defining the security policies and controls that platform teams will build. 

Using the example in Figure 2, let us focus on the policy management control. In this control, the compliance and governance team begins by interpreting regulations and developing requirements and control recommendations to mitigate risk. The Infosec team defines the policy for data sovereignty, which includes data classification, access controls, and encryption requirements. The Platform team reviews the requirements and looks to acquire or build the appropriate tools to accommodate them. This is not a new process. However, with sovereign controls, the Platform and Infosec teams must apply this rigor across many controls, weaving sovereign and technical requirements into the platform without sacrificing control, transparency, or agility. Once the sovereign controls are built, a common control plane can be constructed.

High-level workflow of sovereign control for policy management

Figure 3. High-level workflow of sovereign control for policy management

How Red Hat can help

Red Hat empowers our customers to achieve resiliency, autonomy, and independence by providing:

  • Transparency. Red Hat enterprise open source solutions build trust that is vital for digital sovereignty. Our open source model allows community contributions, ensuring Red Hat’s transparency, security-focus, and reliability. An upstream-first policy develops changes for community use, enhancing security, compliance, and supply chain integrity. This model helps nations control digital assets by supporting software adaptation. Red Hat provides transparency with hardening, lifecycle management, and support for critical deployments, fostering trust for autonomy and resilience.
  • Control. Red Hat's open hybrid cloud strategy offers organizations extensive deployment options—on-premise, cloud, or edge—supported by a global ecosystem of cloud service provider (CSP) partners. This supports choosing suitable technologies and local expertise to meet sovereignty needs now and in the future. Red Hat’s open standards and consistent experience prevent vendor lock-in and make IT investments ready for the future, offering agility amid evolving regulations and tech. For example, running applications in Red Hat® OpenShift® allows smooth migration to different infrastructures if hyperscalers no longer meet sovereignty requirements.
  • Operational stability. Red Hat technologies are vital for enhancing digital sovereignty and safeguarding critical infrastructure, addressing regulations like the European Union’s (EU) Digital Operational Resilience Act (DORA). Our solutions, with partner support, protect sensitive data, improve backup and recovery, bolster business continuity, and enhance software supply chain security, improving resiliency in organizations. Red Hat’s portfolio offers capabilities such as data snapshots, archiving, and improving Recovery Point Objective/Recovery Time Objective (RPO/RTO) through configuration management and automated failover. The products and services provide the flexibility necessary for sovereign solutions now and in the future. 

Learn more

Discover how Red Hat's open hybrid cloud approach and robust security features can help your organization achieve true digital sovereignty. Explore the many ways Red Hat and our partner ecosystem can help you safeguard sensitive data, ensure operational independence, and maximize your business potential.

Visit digital sovereignty solutions from Red Hat to learn more. 

Tags:Cloud services

Red Hat logoLinkedInYouTubeFacebookX

Products & portfolios

  • Red Hat AI
  • Red Hat Enterprise Linux
  • Red Hat OpenShift
  • Red Hat Ansible Automation Platform
  • Cloud services
  • See all products

Tools

  • Training and certification
  • My account
  • Customer support
  • Developer resources
  • Find a partner
  • Red Hat Ecosystem Catalog
  • Documentation

Try, buy, & sell

  • Product trial center
  • Red Hat Store
  • Buy online (Japan)
  • Console

Communicate

  • Contact sales
  • Contact customer service
  • Contact training
  • Social

About Red Hat

Red Hat is an open hybrid cloud technology leader, delivering a consistent, comprehensive foundation for transformative IT and artificial intelligence (AI) applications in the enterprise. As a trusted adviser to the Fortune 500, Red Hat offers cloud, developer, Linux, automation, and application platform technologies, as well as award-winning services.

  • Our company
  • How we work
  • Customer success stories
  • Analyst relations
  • Newsroom
  • Open source commitments
  • Our social impact
  • Jobs

Select a language

  • 简体中文
  • English
  • Français
  • Deutsch
  • Italiano
  • 日本語
  • 한국어
  • Português
  • Español

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility