Data Residency complete
Control over where data is physically stored, processed, and replicated
L0 Unaware
No awareness of where data is physically stored, processed, or replicated. The organisation has no data residency policy and data may reside in any region at the provider's discretion.
Criteria
RES-L0-C1Organisation has no documented data residency policy or requirements.Evidence guidance
Absence of any policy document, board resolution, or architectural guideline referencing data location.
RES-L0-C2No inventory exists mapping data assets to physical storage locations or provider regions.Evidence guidance
Confirm that no data-location register, CMDB entries, or cloud-account region reports have been produced.
RES-L0-C3Cloud services are deployed using provider defaults with no region selection applied.Evidence guidance
Review cloud console settings or infrastructure-as-code templates; default or auto-selected regions indicate this criterion is met.
Indicators
- No region or location field populated in any cloud deployment record.
- Employees cannot name the country or region where primary data is stored.
- No data-residency clause exists in any active vendor contract.
- Risk register contains no entry for cross-border data transfer.
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-44, art-45, art-46 | critical | Transfers to third countries without safeguards violate Chapter V. Without awareness, lawful transfer basis cannot be demonstrated. |
NDSG | art-16 | critical | Cross-border disclosure without adequate protection assessment breaches nDSG art-16. |
CLOUD-ACT | 18-usc-2703 | high | Data stored in US-controlled infrastructure is subject to CLOUD Act compelled disclosure regardless of physical location. |
Upgrade path
Identify all cloud services in use and document the regions where data is stored. Begin drafting a data residency policy that defines acceptable jurisdictions.
Risk if stagnant
Regulatory enforcement actions under GDPR Chapter V or nDSG art-16 are likely. Data may be accessed by foreign authorities without the organisation's knowledge, leading to loss of client trust and potential legal liability.
Typical characteristics
- Cloud accounts created with default region settings (commonly
us-east-1or similar). - No distinction made between data categories (personal data, metadata, backups) in terms of storage location.
- IT and legal teams have not discussed data residency requirements.
- Vendor contracts are signed without reviewing data processing locations.
Why this is dangerous
- Regulatory exposure: GDPR Chapter V prohibits transfers to third countries without an adequacy decision or appropriate safeguards. Operating without awareness means no lawful basis can be demonstrated.
- CLOUD Act reach: If the provider is a US-headquartered company, US authorities may compel disclosure under the CLOUD Act regardless of the data's physical location.
- nDSG non-compliance: The revised Swiss Federal Act on Data Protection requires assessment before cross-border disclosure; without a location inventory this assessment is impossible.
Sovereignty implications
At Level 0, the organisation has no sovereignty over data location. It cannot demonstrate where data resides, cannot assess jurisdictional exposure, and has ceded all location decisions to providers. Data may cross borders without the organisation's knowledge, making it impossible to evaluate regulatory compliance or respond to jurisdictional challenges.
L1 Dependent
Data resides in provider-default regions with no residency guarantees. The organisation is aware that data location matters but relies entirely on the provider's infrastructure decisions, which typically favour US or multi-region deployments.
Criteria
RES-L1-C1Organisation has identified the primary regions where its cloud providers store data.Evidence guidance
Cloud console screenshots, provider documentation, or account settings showing region assignments.
RES-L1-C2No contractual data residency guarantees are in place; provider determines replication and failover regions.Evidence guidance
Review master service agreements and DPAs - confirm absence of region-restriction clauses.
RES-L1-C3Data location awareness exists at an organisational level but no technical or contractual controls enforce it.Evidence guidance
Internal communications, meeting minutes, or risk assessments acknowledging data location without mandating controls.
Indicators
- A register of cloud services and their default regions exists but is not actively maintained.
- Provider determines backup and replication regions without organisational approval.
- Data residency is mentioned in risk assessments but has no assigned remediation owner.
- No SCC or supplementary measures have been executed with any provider.
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-44, art-46 | high | Awareness alone does not satisfy Chapter V requirements. Without contractual safeguards or SCCs, transfers remain unlawful. |
NDSG | art-16, art-17 | high | Knowledge of cross-border transfers without adequate protection measures does not meet nDSG obligations. |
NIS2 | art-21 | medium | NIS2 essential/important entities must understand their supply chain risks, including data location dependencies. |
CLOUD-ACT | 18-usc-2703 | high | Continued use of US-headquartered providers without contractual mitigations leaves data exposed to compelled disclosure. |
Upgrade path
Negotiate data processing agreements (DPAs) with explicit region-restriction clauses. Execute Standard Contractual Clauses (SCCs) with supplementary measures for any provider that processes data outside the EU/EEA or Switzerland.
Risk if stagnant
The organisation remains exposed to regulatory penalties and cannot demonstrate a lawful transfer mechanism under GDPR or nDSG. Provider infrastructure changes (region migrations, new replication targets) may silently move data to unfavourable jurisdictions.
Typical characteristics
- Cloud provider dashboards have been reviewed to identify default regions (e.g., AWS
eu-west-1, AzureWest Europe). - The provider's standard terms of service govern data location; no custom DPA or region-restriction addendum is in place.
- Backup and disaster-recovery replication targets are set by the provider and may include regions outside Europe.
- Internal stakeholders are aware of the issue but treat it as low priority.
Why this is dangerous
- Silent region changes: Providers may update their infrastructure, adding new replication targets or migrating services, without explicit notification.
- Inadequate transfer basis: Awareness without SCCs or an adequacy decision does not constitute a lawful transfer mechanism under GDPR art-46.
- Schrems II implications: Following the CJEU's Schrems II ruling, reliance on Privacy Shield is invalid and SCCs require supplementary measures when transferring to jurisdictions without adequate protections.
- Metadata leakage: Even if primary data remains in the EU, metadata, logs, and analytics data may be processed in other regions by default.
Sovereignty implications
The organisation is aware of where its data resides but has no mechanism to influence or control location decisions. Sovereignty exists only as knowledge - the provider retains full discretion over where data is stored, replicated, and failed over. The absence of contractual or technical controls means the organisation cannot prevent or even detect location changes.
L2 Contractual
Data residency is governed by contractual agreements. DPAs specify EU/EEA or Swiss storage, and SCCs with supplementary measures are in place. However, enforcement is contract-based rather than technically verified, and providers may process metadata or support data outside agreed regions.
Criteria
RES-L2-C1Data processing agreements (DPAs) with all critical providers specify approved data residency regions (EU/EEA or Switzerland).Evidence guidance
Executed DPAs with region-restriction clauses; legal review confirming coverage of all Tier-1 providers.
RES-L2-C2Standard Contractual Clauses (SCCs) with supplementary technical and organisational measures are in place for any provider subject to third-country jurisdiction.Evidence guidance
Signed SCC addenda (EU 2021/914 modules) with documented transfer impact assessments (TIAs).
RES-L2-C3A transfer impact assessment (TIA) has been conducted evaluating the legal framework of each provider's jurisdiction.Evidence guidance
Completed TIA documents referencing provider jurisdiction, government access laws, and supplementary measures adopted.
RES-L2-C4The organisation has documented residual risk for metadata, support tickets, and telemetry data processed outside contracted regions.Evidence guidance
Risk register entry or data flow diagram identifying metadata and ancillary data flows that fall outside DPA region restrictions.
RES-L2-C5The transfer mechanism underlying each cross-border data flow (SCCs with supplementary measures, EU-US Data Privacy Framework, adequacy decision) is named, documented per provider, and accompanied by a contingency plan covering invalidation of the mechanism within the assessment lifecycle.Evidence guidance
For each provider involved in cross-border processing, confirm the named transfer mechanism is recorded in the data transfer register or equivalent. Verify a contingency plan exists describing what the organisation would do if SCCs are tightened by an EDPB or CJEU decision, if the EU-US Data Privacy Framework is invalidated (Schrems III scenario), or if an adequacy decision is withdrawn. The plan should identify the affected workloads, an alternative legal basis or fallback provider, and the expected timeline to switch. Generic statements that 'we would consult counsel' do not satisfy this criterion.
RES-L2-C6AI For SaaS tools with embedded AI features, the DPA restricts inference to named approved regions, and the metadata and telemetry gap for AI-feature data (prompt previews, model-routing logs, abuse-monitoring buffers) is identified as a residual risk separate from the primary-data residency commitment.Evidence guidance
Review the AI clauses of each SaaS DPA. The inference-region restriction must name the regions where the model is hosted and prompts are processed (e.g. EU Data Boundary, Switzerland-only inference, Azure OpenAI EU regions); a clause that restricts only primary data storage and is silent on inference does not satisfy this criterion. For the metadata gap, evidence is a residual-risk register entry that explicitly enumerates AI-feature data flows excluded from the residency commitment, such as prompt preview caches, model-routing telemetry, abuse-monitoring buffers, and aggregated usage metrics. A blanket 'metadata may be processed elsewhere' line in the DPA without an organisation-side acknowledgement is insufficient.
Indicators
- All Tier-1 provider contracts include DPAs with explicit EU/EEA or Swiss region-restriction clauses.
- Transfer impact assessments are completed and reviewed at least annually.
- SCC addenda reference the 2021 EU standard contractual clauses with appropriate modules selected.
- A data transfer register names the transfer mechanism per provider (SCCs, EU-US DPF, adequacy decision) and links each entry to a documented invalidation contingency.
- A residual-risk entry for metadata and telemetry processing outside contracted regions is documented and accepted by the data protection officer.
- AI-feature DPAs name the inference region, and the AI metadata gap (prompt preview caches, model-routing logs, abuse-monitoring buffers) is a separate, named entry in the residual-risk register.
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-44, art-46, art-49 | medium | SCCs with supplementary measures provide a lawful transfer basis per EDPB guidance post-Schrems II, but residual risk remains for metadata processing. |
NDSG | art-16, art-17 | medium | Contractual safeguards satisfy nDSG cross-border requirements in principle, though FDPIC may require additional technical measures. |
NIS2 | art-21 | low | Contractual supply chain risk management aligns with NIS2 obligations for essential and important entities. |
CLOUD-ACT | 18-usc-2703 | medium | SCCs do not override CLOUD Act compelled disclosure. Supplementary measures (encryption, access controls) partially mitigate but do not eliminate this risk. |
Upgrade path
Implement technical controls to enforce data residency: configure geo-fencing at the infrastructure level, restrict replication to approved regions, and deploy monitoring to detect data leaving authorised boundaries. Move beyond contractual assurance to verifiable technical enforcement.
Risk if stagnant
Contractual protections can be breached without detection, and the durability of the protections themselves is bounded by the underlying transfer mechanism. SCCs may be tightened by future EDPB guidance, the EU-US Data Privacy Framework remains a foreseeable Schrems III target during any multi-year assessment lifecycle, and adequacy decisions can be withdrawn. Provider infrastructure changes or government access requests may result in data leaving contracted regions, and the organisation has no technical means to detect or prevent this. CLOUD Act exposure persists despite SCCs.
Typical characteristics
- DPAs with all critical cloud providers include region-restriction clauses specifying EU/EEA or Swiss data centres.
- Transfer impact assessments have been conducted for each provider, evaluating the legal framework in the provider's home jurisdiction.
- SCCs follow the EU 2021/914 standard with appropriate modules and supplementary measures documented.
- The organisation is aware that ancillary data (metadata, support interactions, telemetry) may still be processed outside contracted regions.
- Compliance is verified through contract review rather than technical monitoring.
Why this matters
- Contractual vs. technical reality: A DPA specifying EU residency does not technically prevent a provider from processing data elsewhere. Without monitoring, breaches go undetected.
- Metadata gap: Many providers exclude metadata, CDN logs, DNS queries, and support-ticket content from region-restriction commitments. AI features add a further metadata layer: prompt preview caches, model-routing telemetry, and abuse-monitoring buffers often live with the model provider rather than the SaaS vendor, and DPAs frequently keep them outside the residency clause by default. The AI inference region itself is a separate residency question from primary data storage and needs a separate contractual line.
- CLOUD Act override: US-headquartered providers remain subject to compelled disclosure under the CLOUD Act regardless of contractual commitments. The conflict between GDPR and CLOUD Act creates legal uncertainty.
- Schrems II evolution: Regulatory guidance on supplementary measures continues to evolve; TIAs require regular updates to remain valid.
- Transfer-mechanism fragility: The DPA is only as durable as the legal instrument that authorises the transfer. SCCs can be tightened, the EU-US Data Privacy Framework is a plausible Schrems III target, and adequacy decisions can be withdrawn. Naming the mechanism per provider and rehearsing an invalidation contingency is a Level 2 expectation, not a Level 3 luxury.
Sub-processor considerations
Even with strong primary-provider DPAs, sub-processors may store or process data in different regions. The organisation should maintain a sub-processor register and verify that sub-processor DPAs include equivalent region restrictions.
Sovereignty implications
Sovereignty at Level 2 is contractual rather than technical. The organisation has legal rights to data residency commitments and can hold providers accountable through DPAs and SCCs. However, it cannot independently verify that data remains within contracted regions. Provider changes, metadata processing outside agreed boundaries, and CLOUD Act exposure represent gaps that contracts alone cannot close.
L3 Controlled
Data residency is technically enforced through geo-fencing, region-locked replication, and active monitoring. The organisation operates within defined data sovereignty zones and conducts regular audits to verify that data does not leave approved jurisdictions.
Criteria
RES-L3-C1Geo-fencing is configured at the infrastructure level to restrict data storage and processing to approved regions (EU/EEA or Switzerland).Evidence guidance
Cloud provider region-lock configurations, infrastructure-as-code templates with explicit region constraints, or sovereign cloud zone assignments.
RES-L3-C2Data replication and backup targets are explicitly restricted to approved regions with no automatic failover to non-approved jurisdictions.Evidence guidance
Replication policies, disaster recovery configurations, and backup target settings showing only approved regions.
RES-L3-C3Residency assurance combines provider-attested controls with organisation-side verification: provider compliance reports (SOC 2 Type II, ISO 27001, regional commitments) confirm the provider's framework, and the organisation independently verifies tenant-specific residency through its own logs, endpoint geo-IP checks, or audit rights that have actually been exercised within the past 12 months.Evidence guidance
Collect both layers. Provider-attested layer: current SOC 2 Type II report, ISO 27001 certificate, or written regional service commitment from the provider. These confirm the provider's general control framework, not your tenant's residency. Organisation-verified layer: your own evidence that the controls held for your workloads, such as resource-level region tags from inventory exports, traceroute or endpoint geo-IP records confirming requests resolve to EU/Swiss regions, contractual residency-incident notification logs, or records of audit rights exercised against the provider in the past 12 months. A SOC 2 report alone does not satisfy this criterion.
RES-L3-C4AI Inference for SaaS-embedded AI features is technically confined to approved regions through provider data-boundary programmes or regional model-endpoint pinning, with tenant-readable evidence that the routing held in production.Evidence guidance
Evidence has two layers. Configuration: tenant participation in EU Data Boundary for Microsoft 365 and Copilot, Azure OpenAI deployment in an EU region with regional endpoint enforcement, GitHub Copilot Business with documented inference geography, or an equivalent vendor-specific control. Verification: tenant-scoped logs, region-tagged audit records, or written attestation specific to the tenant confirming the AI feature ran in the named region during the assessment window. A general statement that the vendor 'offers EU inference' without tenant configuration evidence does not satisfy this criterion. Where a vendor cannot expose the routing region per tenant, the criterion is unmet for that vendor.
Indicators
- All cloud deployments are region-locked via infrastructure-as-code policies that prevent resource creation outside approved regions.
- Replication and backup configurations are audited quarterly and restricted to EU/EEA or Swiss regions.
- Automated alerts fire within minutes when data flow to a non-approved region is detected.
- Provider SOC 2 Type II or ISO 27001 reports confirm the provider's residency control framework, paired with the organisation's own verification evidence (region-tagged resource inventory, geo-IP confirmation, exercised audit rights) covering the assessed tenant.
- AI feature inference is pinned to approved regions through a vendor data-boundary programme or regional endpoint configuration, and tenant-scoped evidence confirms the routing held in production during the assessment window.
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-44, art-46, art-47 | low | Technical enforcement of residency combined with contractual safeguards provides strong Chapter V compliance. Residual risk limited to provider-level access. |
NDSG | art-16, art-17 | low | Technical geo-fencing and audit evidence satisfy FDPIC expectations for cross-border transfer controls. |
NIS2 | art-21 | low | Technical residency controls support NIS2 supply chain security and resilience requirements. |
CLOUD-ACT | 18-usc-2703 | medium | Geo-fencing does not prevent CLOUD Act compelled disclosure if the provider is US-headquartered. Risk is mitigated but not eliminated without moving to a non-US provider. |
Upgrade path
Transition to self-hosted infrastructure or a sovereign cloud provider with no foreign-jurisdiction parent company. Eliminate residual CLOUD Act exposure by ensuring no US-headquartered entity has administrative access to infrastructure or data. Move from provider-attested residency to independently verifiable residency: residency that does not depend on the provider's control framework being sound, on the auditor's scope including your tenant, or on the provider's willingness to disclose residency incidents.
Risk if stagnant
Residency at Level 3 still rests on a layered trust model. Provider SOC 2 and ISO reports cover the provider's framework, not the assessed tenant's specific residency. Organisation-side verification can confirm what the controls reported, but cannot independently confirm what the provider did with data outside that view. CLOUD Act exposure persists as long as the provider is subject to US jurisdiction, and a sufficiently motivated state actor with legal leverage over the provider can bypass geo-fencing without leaving evidence in any audit report. Regulatory expectations for sovereign infrastructure continue to increase, particularly for entities in scope of NIS2 and DORA.
Typical characteristics
- Cloud infrastructure is configured with explicit region constraints - resources cannot be provisioned outside approved regions.
- Infrastructure-as-code policies (e.g., Azure Policy, AWS Service Control Policies, GCP Organisation Policies) enforce region restrictions at the organisation level.
- Data replication for high availability and disaster recovery is restricted to data centres within the EU/EEA or Switzerland.
- Network monitoring and SIEM rules detect cross-border data flows and generate alerts.
- Annual audits (internal or third-party) validate data residency controls and produce formal reports.
- AI feature inference is technically confined to approved regions through vendor data-boundary participation (e.g. EU Data Boundary for Microsoft 365 and Copilot) or regional model-endpoint pinning (e.g. Azure OpenAI in an EU region with regional endpoint enforcement). The control is configured at tenant level and re-verified through tenant-scoped logs, not through a generic vendor claim that EU inference is available.
Data sovereignty zones
At this level, the organisation typically defines formal "data sovereignty zones" - logical groupings of approved regions where different data classifications may reside. For example:
- Zone A (Swiss): Data centres in Zurich and Geneva for the most sensitive data.
- Zone B (EU/EEA): Data centres in Frankfurt, Amsterdam, or Paris for general EU personal data.
- Zone C (Restricted): No data may be stored or processed; any flow to these regions triggers an incident.
Remaining gaps
- Provider-attested vs independently verifiable. Provider compliance reports (SOC 2 Type II, ISO 27001) confirm the provider's residency control framework. They do not independently confirm that residency held for a specific customer tenant. The organisation's own verification (region-tagged inventory, geo-IP confirmation, exercised audit rights) closes part of this gap, but cannot reach data flows outside its view. True independent verification of residency for the tenant only emerges at Level 4.
- Provider-level access. Even with geo-fencing, the cloud provider's global administrative infrastructure may allow employees in non-approved jurisdictions to access data for support or maintenance purposes.
- CLOUD Act. US-headquartered providers (AWS, Azure, GCP) remain subject to compelled disclosure regardless of where data is physically stored. Geo-fencing is a technical control, not a legal shield.
- Hardware-level trust. The organisation trusts the provider's physical security and hardware integrity without independent verification.
When Level 3 is warranted
Level 3 is appropriate for organisations that need verifiable data residency enforcement rather than contractual assurance alone. This includes organisations processing personal data at scale under GDPR or nDSG, those whose regulators or auditors require evidence of technical controls, and those operating in sectors where contractual guarantees have proven insufficient following provider infrastructure changes.
When Level 3 is excessive
If the organisation's risk profile allows contractual protections at Level 2 to be proportionate, the additional operational cost of geo-fencing, monitoring infrastructure, and regular audits may not be justified. Smaller organisations that can demonstrate compliance through contracts and transfer impact assessments may find Level 2 sufficient until regulatory expectations evolve.
Sovereignty implications
Sovereignty at Level 3 is technically enforced and partially verifiable. The organisation can confirm, through provider attestation paired with its own monitoring and inventory evidence, that residency controls held for the tenant within the scope of those views. What it cannot independently confirm is what the provider did with data outside that view: support sessions across regions, internal data flows for resilience or capacity, or compelled access. The provider's global administrative infrastructure and CLOUD Act exposure (for US-headquartered providers) remain residual gaps that technical controls combined with provider-attested audits cannot fully close. Level 4 closes them by removing the dependency on a provider that could be subject to those pressures in the first place.
L4 Autonomous
Complete control over data's physical location through self-hosted infrastructure or a sovereign cloud provider with no foreign-jurisdiction parent company. No cross-border transfers occur, and the organisation has full authority over hardware, facilities, and administrative access.
Criteria
RES-L4-C1All data is stored and processed on infrastructure physically located in Switzerland or an approved EU/EEA jurisdiction.Evidence guidance
Data centre contracts and facility addresses confirming all infrastructure resides in approved jurisdictions.
RES-L4-C2All infrastructure is operated by an entity with no foreign-jurisdiction parent company.Evidence guidance
Corporate ownership documentation (commercial register extracts, shareholder disclosures) confirming no US or other foreign-jurisdiction parent entity.
RES-L4-C3No cross-border data transfers occur for any purpose, including support, telemetry, software updates, or disaster recovery.Evidence guidance
Network flow analysis, firewall rules, and egress monitoring confirming zero cross-border data flows. DNS, NTP, and update channels verified as domestic or EU-based.
RES-L4-C4Physical security of data centre facilities is under organisational control or subject to a domestic-only trust chain with independent audit rights.Evidence guidance
Physical access logs, facility security audit reports, and contractual audit-right clauses. For co-location: proof that facility operator is domestically owned.
RES-L4-C5Administrative access to all infrastructure is restricted to personnel within approved jurisdictions, with no remote access paths from foreign-jurisdiction entities.Evidence guidance
Access control policies, VPN and bastion host configurations, and HR records confirming all administrative personnel are based in approved jurisdictions.
Indicators
- All infrastructure is on-premises or in a sovereign cloud operated by a Swiss or EU-domiciled entity with no foreign parent company.
- Network egress monitoring confirms zero data flows to non-approved jurisdictions over the past 12 months.
- Physical data centre access is restricted to vetted personnel with no foreign-jurisdiction reporting obligations.
- Annual sovereignty audit by an independent domestic auditor confirms full compliance with data residency requirements.
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-44, art-45, art-46, art-48, art-49 | minimal | No cross-border transfers eliminates Chapter V obligations entirely. Art-48 (third-country judgments) is structurally mitigated by removing foreign-jurisdiction providers. |
NDSG | art-16, art-17 | minimal | Full domestic or EU/EEA residency with no foreign-jurisdiction provider eliminates nDSG cross-border disclosure concerns. |
NIS2 | art-21 | minimal | Sovereign infrastructure with domestic supply chain satisfies the highest NIS2 expectations for critical infrastructure resilience. |
CLOUD-ACT | 18-usc-2703 | minimal | No US-headquartered entity in the infrastructure chain means CLOUD Act has no legal mechanism for compelled disclosure. |
Risk if stagnant
At the highest maturity level, the primary risk is complacency. Infrastructure must be actively maintained, ownership structures of sovereign cloud providers must be monitored for acquisition by foreign entities, and supply chain components (hardware, firmware) must be continuously assessed for foreign-jurisdiction dependencies.
Typical characteristics
- Infrastructure is either self-hosted (on-premises data centre) or provided by a sovereign cloud operator such as a Swiss-domiciled provider with no US or other foreign parent company.
- All hardware, networking equipment, and storage media are physically located in facilities the organisation controls or has contractual audit rights over.
- No US-headquartered entity exists anywhere in the infrastructure supply chain, eliminating CLOUD Act exposure.
- Administrative and support access is restricted to personnel based in approved jurisdictions.
- Network egress is actively monitored and no data leaves approved sovereignty zones.
Implementation models
Self-hosted (on-premises)
- Organisation owns or leases rack space in a Swiss data centre.
- Full control over hardware procurement, configuration, and lifecycle management.
- Highest sovereignty but requires significant operational capability and capital investment.
Sovereign cloud provider
- Services provided by a Swiss or EU-domiciled cloud operator (e.g., cyon, Infomaniak, Exoscale, Open Telekom Cloud with domestic entity).
- Provider's corporate structure has no foreign-jurisdiction parent or controlling shareholder.
- Contractual audit rights allow independent verification of residency controls.
Hybrid sovereign
- Critical data on self-hosted infrastructure; less sensitive workloads on sovereign cloud.
- Clear data classification policy determines which workloads run where.
- Unified monitoring across both environments.
CLOUD Act structural mitigation
The CLOUD Act grants US authorities the ability to compel disclosure from US-headquartered companies regardless of where data is physically stored. At Level 4, this risk is structurally eliminated because:
- No US-headquartered entity has access to the infrastructure.
- No US-headquartered entity holds encryption keys or administrative credentials.
- No service agreement exists with a US-headquartered company that would create a legal nexus for compelled disclosure.
Operational considerations
Reaching Level 4 does not mean the work is complete. The organisation must continuously monitor:
- Corporate ownership changes: Sovereign cloud providers may be acquired by foreign entities, reintroducing jurisdiction risk.
- Hardware supply chain: Servers, networking equipment, and storage media may contain firmware from foreign-jurisdiction manufacturers.
- Regulatory evolution: New international agreements or domestic legislation may alter the residency landscape.
- Operational discipline: Personnel changes, emergency procedures, and incident response must maintain sovereignty guarantees under all conditions.
When Level 4 is warranted
Level 4 is appropriate when the organisation's threat model includes foreign government access to data, when clients contractually require sovereign infrastructure, or when operating in sectors where data sovereignty is a regulatory requirement or procurement criterion, such as finance, healthcare, legal services, and government contracting.
When Level 4 is excessive
For most organisations, Level 3 technical controls satisfy regulatory requirements and provide verifiable residency enforcement. Level 4 requires significant capital investment in infrastructure, ongoing operational costs for facilities and hardware lifecycle management, and a commitment to monitoring provider ownership structures and supply chain integrity. Organisations should pursue Level 4 only when the residual CLOUD Act or foreign jurisdiction exposure at Level 3 is unacceptable for their specific use case.