Framework
Control Matrix
Twelve sovereignty dimensions, five maturity levels. Every cell opens into criteria, evidence, and regulatory mappings.
Scroll horizontally to see all dimensions
DSCM-IAM
Identity & Access
DSCM-KEYS
Cryptographic Keys
DSCM-RES
Data Residency
DSCM-PROC
Data Processing
DSCM-LEGAL
Legal & Contractual
DSCM-AUDIT
Logging & Audit
DSCM-NET
Network Infrastructure
DSCM-COMP draft
Compute & Runtime
DSCM-SUPPLY draft
Supply Chain
DSCM-EXIT draft
Exit Strategy
DSCM-IR draft
Incident Response
DSCM-GOV draft
Governance & Compliance
- Identity Identity & Access Control over user identities, authentication mechanisms, and access management systems
- Keys Cryptographic Keys Control over encryption keys, key management systems, and cryptographic operations
- Residency Data Residency Control over where data is physically stored, processed, and replicated
- Processing Data Processing Control over how data is processed, transformed, and accessed by compute workloads
- Legal Legal & Contractual Legal frameworks, contractual protections, and jurisdictional control over service agreements
- Audit Logging & Audit Control over audit trails, log storage, monitoring systems, and forensic capabilities
- Network Network Infrastructure Control over network topology, DNS, CDN, and connectivity infrastructure
- Compute Compute & Runtime draft Control over compute environments, runtime platforms, and execution infrastructure
- Supply Chain Supply Chain draft Control over software supply chain, dependencies, and third-party components
- Exit Exit Strategy draft Preparedness for migrating away from current providers, avoiding vendor lock-in
- Incidents Incident Response draft Control over security incident detection, response, and recovery processes
- Governance Governance & Compliance draft Organizational governance structures and compliance frameworks for digital sovereignty