Data Residency complete
Control over where data is physically stored, processed, and replicated
L0 Unaware
No awareness of where data is physically stored, processed, or replicated. The organisation has no data residency policy and data may reside in any region at the provider's discretion.
Criteria
RES-L0-C1Organisation has no documented data residency policy or requirements.Evidence guidance
Absence of any policy document, board resolution, or architectural guideline referencing data location.
RES-L0-C2No inventory exists mapping data assets to physical storage locations or provider regions.Evidence guidance
Confirm that no data-location register, CMDB entries, or cloud-account region reports have been produced.
RES-L0-C3Cloud services are deployed using provider defaults with no region selection applied.Evidence guidance
Review cloud console settings or infrastructure-as-code templates; default or auto-selected regions indicate this criterion is met.
Indicators
- No region or location field populated in any cloud deployment record.
- Employees cannot name the country or region where primary data is stored.
- No data-residency clause exists in any active vendor contract.
- Risk register contains no entry for cross-border data transfer.
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-44, art-45, art-46 | critical | Transfers to third countries without safeguards violate Chapter V. Without awareness, lawful transfer basis cannot be demonstrated. |
NDSG | art-16 | critical | Cross-border disclosure without adequate protection assessment breaches nDSG art-16. |
CLOUD-ACT | 18-usc-2703 | high | Data stored in US-controlled infrastructure is subject to CLOUD Act compelled disclosure regardless of physical location. |
Upgrade path
Identify all cloud services in use and document the regions where data is stored. Begin drafting a data residency policy that defines acceptable jurisdictions.
Risk if stagnant
Regulatory enforcement actions under GDPR Chapter V or nDSG art-16 are likely. Data may be accessed by foreign authorities without the organisation's knowledge, leading to loss of client trust and potential legal liability.
Typical characteristics
- Cloud accounts created with default region settings (commonly
us-east-1or similar). - No distinction made between data categories (personal data, metadata, backups) in terms of storage location.
- IT and legal teams have not discussed data residency requirements.
- Vendor contracts are signed without reviewing data processing locations.
Why this is dangerous
- Regulatory exposure: GDPR Chapter V prohibits transfers to third countries without an adequacy decision or appropriate safeguards. Operating without awareness means no lawful basis can be demonstrated.
- CLOUD Act reach: If the provider is a US-headquartered company, US authorities may compel disclosure under the CLOUD Act regardless of the data's physical location.
- nDSG non-compliance: The revised Swiss Federal Act on Data Protection requires assessment before cross-border disclosure; without a location inventory this assessment is impossible.
Sovereignty implications
At Level 0, the organisation has no sovereignty over data location. It cannot demonstrate where data resides, cannot assess jurisdictional exposure, and has ceded all location decisions to providers. Data may cross borders without the organisation's knowledge, making it impossible to evaluate regulatory compliance or respond to jurisdictional challenges.
L1 Dependent
Data resides in provider-default regions with no residency guarantees. The organisation is aware that data location matters but relies entirely on the provider's infrastructure decisions, which typically favour US or multi-region deployments.
Criteria
RES-L1-C1Organisation has identified the primary regions where its cloud providers store data.Evidence guidance
Cloud console screenshots, provider documentation, or account settings showing region assignments.
RES-L1-C2No contractual data residency guarantees are in place; provider determines replication and failover regions.Evidence guidance
Review master service agreements and DPAs - confirm absence of region-restriction clauses.
RES-L1-C3Data location awareness exists at an organisational level but no technical or contractual controls enforce it.Evidence guidance
Internal communications, meeting minutes, or risk assessments acknowledging data location without mandating controls.
Indicators
- A register of cloud services and their default regions exists but is not actively maintained.
- Provider determines backup and replication regions without organisational approval.
- Data residency is mentioned in risk assessments but has no assigned remediation owner.
- No SCC or supplementary measures have been executed with any provider.
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-44, art-46 | high | Awareness alone does not satisfy Chapter V requirements. Without contractual safeguards or SCCs, transfers remain unlawful. |
NDSG | art-16, art-17 | high | Knowledge of cross-border transfers without adequate protection measures does not meet nDSG obligations. |
NIS2 | art-21 | medium | NIS2 essential/important entities must understand their supply chain risks, including data location dependencies. |
CLOUD-ACT | 18-usc-2703 | high | Continued use of US-headquartered providers without contractual mitigations leaves data exposed to compelled disclosure. |
Upgrade path
Negotiate data processing agreements (DPAs) with explicit region-restriction clauses. Execute Standard Contractual Clauses (SCCs) with supplementary measures for any provider that processes data outside the EU/EEA or Switzerland.
Risk if stagnant
The organisation remains exposed to regulatory penalties and cannot demonstrate a lawful transfer mechanism under GDPR or nDSG. Provider infrastructure changes (region migrations, new replication targets) may silently move data to unfavourable jurisdictions.
Typical characteristics
- Cloud provider dashboards have been reviewed to identify default regions (e.g., AWS
eu-west-1, AzureWest Europe). - The provider's standard terms of service govern data location; no custom DPA or region-restriction addendum is in place.
- Backup and disaster-recovery replication targets are set by the provider and may include regions outside Europe.
- Internal stakeholders are aware of the issue but treat it as low priority.
Why this is dangerous
- Silent region changes: Providers may update their infrastructure, adding new replication targets or migrating services, without explicit notification.
- Inadequate transfer basis: Awareness without SCCs or an adequacy decision does not constitute a lawful transfer mechanism under GDPR art-46.
- Schrems II implications: Following the CJEU's Schrems II ruling, reliance on Privacy Shield is invalid and SCCs require supplementary measures when transferring to jurisdictions without adequate protections.
- Metadata leakage: Even if primary data remains in the EU, metadata, logs, and analytics data may be processed in other regions by default.
Sovereignty implications
The organisation is aware of where its data resides but has no mechanism to influence or control location decisions. Sovereignty exists only as knowledge - the provider retains full discretion over where data is stored, replicated, and failed over. The absence of contractual or technical controls means the organisation cannot prevent or even detect location changes.
L2 Contractual
Data residency is governed by contractual agreements. DPAs specify EU/EEA or Swiss storage, and SCCs with supplementary measures are in place. However, enforcement is contract-based rather than technically verified, and providers may process metadata or support data outside agreed regions.
Criteria
RES-L2-C1Data processing agreements (DPAs) with all critical providers specify approved data residency regions (EU/EEA or Switzerland).Evidence guidance
Executed DPAs with region-restriction clauses; legal review confirming coverage of all Tier-1 providers.
RES-L2-C2Standard Contractual Clauses (SCCs) with supplementary technical and organisational measures are in place for any provider subject to third-country jurisdiction.Evidence guidance
Signed SCC addenda (EU 2021/914 modules) with documented transfer impact assessments (TIAs).
RES-L2-C3A transfer impact assessment (TIA) has been conducted evaluating the legal framework of each provider's jurisdiction.Evidence guidance
Completed TIA documents referencing provider jurisdiction, government access laws, and supplementary measures adopted.
RES-L2-C4The organisation has documented residual risk for metadata, support tickets, and telemetry data processed outside contracted regions.Evidence guidance
Risk register entry or data flow diagram identifying metadata and ancillary data flows that fall outside DPA region restrictions.
Indicators
- All Tier-1 provider contracts include DPAs with explicit EU/EEA or Swiss region-restriction clauses.
- Transfer impact assessments are completed and reviewed at least annually.
- SCC addenda reference the 2021 EU standard contractual clauses with appropriate modules selected.
- A residual-risk entry for metadata and telemetry processing outside contracted regions is documented and accepted by the data protection officer.
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-44, art-46, art-49 | medium | SCCs with supplementary measures provide a lawful transfer basis per EDPB guidance post-Schrems II, but residual risk remains for metadata processing. |
NDSG | art-16, art-17 | medium | Contractual safeguards satisfy nDSG cross-border requirements in principle, though FDPIC may require additional technical measures. |
NIS2 | art-21 | low | Contractual supply chain risk management aligns with NIS2 obligations for essential and important entities. |
CLOUD-ACT | 18-usc-2703 | medium | SCCs do not override CLOUD Act compelled disclosure. Supplementary measures (encryption, access controls) partially mitigate but do not eliminate this risk. |
Upgrade path
Implement technical controls to enforce data residency: configure geo-fencing at the infrastructure level, restrict replication to approved regions, and deploy monitoring to detect data leaving authorised boundaries. Move beyond contractual assurance to verifiable technical enforcement.
Risk if stagnant
Contractual protections can be breached without detection. Provider infrastructure changes or government access requests may result in data leaving contracted regions, and the organisation has no technical means to detect or prevent this. CLOUD Act exposure persists despite SCCs.
Typical characteristics
- DPAs with all critical cloud providers include region-restriction clauses specifying EU/EEA or Swiss data centres.
- Transfer impact assessments have been conducted for each provider, evaluating the legal framework in the provider's home jurisdiction.
- SCCs follow the EU 2021/914 standard with appropriate modules and supplementary measures documented.
- The organisation is aware that ancillary data (metadata, support interactions, telemetry) may still be processed outside contracted regions.
- Compliance is verified through contract review rather than technical monitoring.
Why this matters
- Contractual vs. technical reality: A DPA specifying EU residency does not technically prevent a provider from processing data elsewhere. Without monitoring, breaches go undetected.
- Metadata gap: Many providers exclude metadata, CDN logs, DNS queries, and support-ticket content from region-restriction commitments.
- CLOUD Act override: US-headquartered providers remain subject to compelled disclosure under the CLOUD Act regardless of contractual commitments. The conflict between GDPR and CLOUD Act creates legal uncertainty.
- Schrems II evolution: Regulatory guidance on supplementary measures continues to evolve; TIAs require regular updates to remain valid.
Sub-processor considerations
Even with strong primary-provider DPAs, sub-processors may store or process data in different regions. The organisation should maintain a sub-processor register and verify that sub-processor DPAs include equivalent region restrictions.
Sovereignty implications
Sovereignty at Level 2 is contractual rather than technical. The organisation has legal rights to data residency commitments and can hold providers accountable through DPAs and SCCs. However, it cannot independently verify that data remains within contracted regions. Provider changes, metadata processing outside agreed boundaries, and CLOUD Act exposure represent gaps that contracts alone cannot close.
L3 Controlled
Data residency is technically enforced through geo-fencing, region-locked replication, and active monitoring. The organisation operates within defined data sovereignty zones and conducts regular audits to verify that data does not leave approved jurisdictions.
Criteria
RES-L3-C1Geo-fencing is configured at the infrastructure level to restrict data storage and processing to approved regions (EU/EEA or Switzerland).Evidence guidance
Cloud provider region-lock configurations, infrastructure-as-code templates with explicit region constraints, or sovereign cloud zone assignments.
RES-L3-C2Data replication and backup targets are explicitly restricted to approved regions with no automatic failover to non-approved jurisdictions.Evidence guidance
Replication policies, disaster recovery configurations, and backup target settings showing only approved regions.
RES-L3-C3Regular audits (at least annually) verify that data residency controls are functioning as intended and no data has left approved regions.Evidence guidance
Audit reports, compliance certificates, or third-party attestation reports confirming data residency enforcement.
Indicators
- All cloud deployments are region-locked via infrastructure-as-code policies that prevent resource creation outside approved regions.
- Replication and backup configurations are audited quarterly and restricted to EU/EEA or Swiss regions.
- Automated alerts fire within minutes when data flow to a non-approved region is detected.
- Annual third-party audit or SOC 2 Type II report confirms data residency controls are effective.
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-44, art-46, art-47 | low | Technical enforcement of residency combined with contractual safeguards provides strong Chapter V compliance. Residual risk limited to provider-level access. |
NDSG | art-16, art-17 | low | Technical geo-fencing and audit evidence satisfy FDPIC expectations for cross-border transfer controls. |
NIS2 | art-21 | low | Technical residency controls support NIS2 supply chain security and resilience requirements. |
CLOUD-ACT | 18-usc-2703 | medium | Geo-fencing does not prevent CLOUD Act compelled disclosure if the provider is US-headquartered. Risk is mitigated but not eliminated without moving to a non-US provider. |
Upgrade path
Transition to self-hosted infrastructure or a sovereign cloud provider with no foreign-jurisdiction parent company. Eliminate residual CLOUD Act exposure by ensuring no US-headquartered entity has administrative access to infrastructure or data.
Risk if stagnant
CLOUD Act exposure persists as long as the provider is subject to US jurisdiction. While technical controls are strong, a sufficiently motivated state actor with legal leverage over the provider can bypass geo-fencing. Regulatory expectations for sovereign infrastructure continue to increase.
Typical characteristics
- Cloud infrastructure is configured with explicit region constraints - resources cannot be provisioned outside approved regions.
- Infrastructure-as-code policies (e.g., Azure Policy, AWS Service Control Policies, GCP Organisation Policies) enforce region restrictions at the organisation level.
- Data replication for high availability and disaster recovery is restricted to data centres within the EU/EEA or Switzerland.
- Network monitoring and SIEM rules detect cross-border data flows and generate alerts.
- Annual audits (internal or third-party) validate data residency controls and produce formal reports.
Data sovereignty zones
At this level, the organisation typically defines formal "data sovereignty zones" - logical groupings of approved regions where different data classifications may reside. For example:
- Zone A (Swiss): Data centres in Zurich and Geneva for the most sensitive data.
- Zone B (EU/EEA): Data centres in Frankfurt, Amsterdam, or Paris for general EU personal data.
- Zone C (Restricted): No data may be stored or processed; any flow to these regions triggers an incident.
Remaining gaps
- Provider-level access: Even with geo-fencing, the cloud provider's global administrative infrastructure may allow employees in non-approved jurisdictions to access data for support or maintenance purposes.
- CLOUD Act: US-headquartered providers (AWS, Azure, GCP) remain subject to compelled disclosure regardless of where data is physically stored. Geo-fencing is a technical control, not a legal shield.
- Hardware-level trust: The organisation trusts the provider's physical security and hardware integrity without independent verification.
When Level 3 is warranted
Level 3 is appropriate for organisations that need verifiable data residency enforcement rather than contractual assurance alone. This includes organisations processing personal data at scale under GDPR or nDSG, those whose regulators or auditors require evidence of technical controls, and those operating in sectors where contractual guarantees have proven insufficient following provider infrastructure changes.
When Level 3 is excessive
If the organisation's risk profile allows contractual protections at Level 2 to be proportionate, the additional operational cost of geo-fencing, monitoring infrastructure, and regular audits may not be justified. Smaller organisations that can demonstrate compliance through contracts and transfer impact assessments may find Level 2 sufficient until regulatory expectations evolve.
Sovereignty implications
Sovereignty at Level 3 is technically enforced and independently verifiable. The organisation can confirm through monitoring and audit evidence that data remains within approved jurisdictions. However, the provider's global administrative infrastructure and CLOUD Act exposure (for US-headquartered providers) represent residual gaps that technical controls alone cannot fully close.
L4 Autonomous
Complete control over data's physical location through self-hosted infrastructure or a sovereign cloud provider with no foreign-jurisdiction parent company. No cross-border transfers occur, and the organisation has full authority over hardware, facilities, and administrative access.
Criteria
RES-L4-C1All data is stored and processed on infrastructure physically located in Switzerland or an approved EU/EEA jurisdiction.Evidence guidance
Data centre contracts and facility addresses confirming all infrastructure resides in approved jurisdictions.
RES-L4-C2All infrastructure is operated by an entity with no foreign-jurisdiction parent company.Evidence guidance
Corporate ownership documentation (commercial register extracts, shareholder disclosures) confirming no US or other foreign-jurisdiction parent entity.
RES-L4-C3No cross-border data transfers occur for any purpose, including support, telemetry, software updates, or disaster recovery.Evidence guidance
Network flow analysis, firewall rules, and egress monitoring confirming zero cross-border data flows. DNS, NTP, and update channels verified as domestic or EU-based.
RES-L4-C4Physical security of data centre facilities is under organisational control or subject to a domestic-only trust chain with independent audit rights.Evidence guidance
Physical access logs, facility security audit reports, and contractual audit-right clauses. For co-location: proof that facility operator is domestically owned.
RES-L4-C5Administrative access to all infrastructure is restricted to personnel within approved jurisdictions, with no remote access paths from foreign-jurisdiction entities.Evidence guidance
Access control policies, VPN and bastion host configurations, and HR records confirming all administrative personnel are based in approved jurisdictions.
Indicators
- All infrastructure is on-premises or in a sovereign cloud operated by a Swiss or EU-domiciled entity with no foreign parent company.
- Network egress monitoring confirms zero data flows to non-approved jurisdictions over the past 12 months.
- Physical data centre access is restricted to vetted personnel with no foreign-jurisdiction reporting obligations.
- Annual sovereignty audit by an independent domestic auditor confirms full compliance with data residency requirements.
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-44, art-45, art-46, art-48, art-49 | minimal | No cross-border transfers eliminates Chapter V obligations entirely. Art-48 (third-country judgments) is structurally mitigated by removing foreign-jurisdiction providers. |
NDSG | art-16, art-17 | minimal | Full domestic or EU/EEA residency with no foreign-jurisdiction provider eliminates nDSG cross-border disclosure concerns. |
NIS2 | art-21 | minimal | Sovereign infrastructure with domestic supply chain satisfies the highest NIS2 expectations for critical infrastructure resilience. |
CLOUD-ACT | 18-usc-2703 | minimal | No US-headquartered entity in the infrastructure chain means CLOUD Act has no legal mechanism for compelled disclosure. |
Risk if stagnant
At the highest maturity level, the primary risk is complacency. Infrastructure must be actively maintained, ownership structures of sovereign cloud providers must be monitored for acquisition by foreign entities, and supply chain components (hardware, firmware) must be continuously assessed for foreign-jurisdiction dependencies.
Typical characteristics
- Infrastructure is either self-hosted (on-premises data centre) or provided by a sovereign cloud operator such as a Swiss-domiciled provider with no US or other foreign parent company.
- All hardware, networking equipment, and storage media are physically located in facilities the organisation controls or has contractual audit rights over.
- No US-headquartered entity exists anywhere in the infrastructure supply chain, eliminating CLOUD Act exposure.
- Administrative and support access is restricted to personnel based in approved jurisdictions.
- Network egress is actively monitored and no data leaves approved sovereignty zones.
Implementation models
Self-hosted (on-premises)
- Organisation owns or leases rack space in a Swiss data centre.
- Full control over hardware procurement, configuration, and lifecycle management.
- Highest sovereignty but requires significant operational capability and capital investment.
Sovereign cloud provider
- Services provided by a Swiss or EU-domiciled cloud operator (e.g., cyon, Infomaniak, Exoscale, Open Telekom Cloud with domestic entity).
- Provider's corporate structure has no foreign-jurisdiction parent or controlling shareholder.
- Contractual audit rights allow independent verification of residency controls.
Hybrid sovereign
- Critical data on self-hosted infrastructure; less sensitive workloads on sovereign cloud.
- Clear data classification policy determines which workloads run where.
- Unified monitoring across both environments.
CLOUD Act structural mitigation
The CLOUD Act grants US authorities the ability to compel disclosure from US-headquartered companies regardless of where data is physically stored. At Level 4, this risk is structurally eliminated because:
- No US-headquartered entity has access to the infrastructure.
- No US-headquartered entity holds encryption keys or administrative credentials.
- No service agreement exists with a US-headquartered company that would create a legal nexus for compelled disclosure.
Operational considerations
Reaching Level 4 does not mean the work is complete. The organisation must continuously monitor:
- Corporate ownership changes: Sovereign cloud providers may be acquired by foreign entities, reintroducing jurisdiction risk.
- Hardware supply chain: Servers, networking equipment, and storage media may contain firmware from foreign-jurisdiction manufacturers.
- Regulatory evolution: New international agreements or domestic legislation may alter the residency landscape.
- Operational discipline: Personnel changes, emergency procedures, and incident response must maintain sovereignty guarantees under all conditions.
When Level 4 is warranted
Level 4 is appropriate when the organisation's threat model includes foreign government access to data, when clients contractually require sovereign infrastructure, or when operating in sectors where data sovereignty is a regulatory requirement or procurement criterion, such as finance, healthcare, legal services, and government contracting.
When Level 4 is excessive
For most organisations, Level 3 technical controls satisfy regulatory requirements and provide verifiable residency enforcement. Level 4 requires significant capital investment in infrastructure, ongoing operational costs for facilities and hardware lifecycle management, and a commitment to monitoring provider ownership structures and supply chain integrity. Organisations should pursue Level 4 only when the residual CLOUD Act or foreign jurisdiction exposure at Level 3 is unacceptable for their specific use case.