Cloud Sovereignty Framework
European Digital Sovereignty

The Cloud Sovereignty Framework of the European Commission (DG DIGIT) defines what digital sovereignty means operationally. Eight clear objectives, five assurance levels and a unified evaluation framework for procuring sovereign cloud services.

Learn More

What is the Cloud Sovereignty Framework?

Version 1.2.1 (October 2025) defines precise requirements for how procurement bodies evaluate cloud providers along eight sovereignty objectives. It serves as a minimum requirement via SEAL levels and as an award criterion via a weighted score. The approach combines concrete control questions with evidence requirements and a unified evaluation matrix – developed in the context of CIGREF Trusted Cloud, Gaia-X, NIS2, DORA and national strategies like “Cloud de Confiance”.

Cloud Sovereignty Framework

The Eight Sovereignty Objectives

Eight measurable dimensions structure digital sovereignty – from strategic independence to sustainable operational capability.

SOV-1: Strategic Sovereignty

Structural anchoring in the EU

  • Decision-making bodies, financing, value creation in EU jurisdiction
  • Protection against “Change of Control” by non-EU entities
  • Continued operation despite external pressure: design and enforcement capability beyond contracts

SOV-2: Legal & Jurisdictional Sovereignty

Legal protection against extraterritorial access

  • EU law as governing jurisdiction, EU court venue
  • Shielding against CLOUD Act, FISA & Co.
  • No legal, contractual or technical channels for third-country access

SOV-3: Data & AI Sovereignty

Technical control over data and AI

  • Customer key sovereignty (BYOK/HSM), complete access logs
  • Strict EU data localization without fallbacks
  • EU control over models, pipelines and platforms; verifiable deletion proofs

SOV-4: Operational Sovereignty

Vendor-independent operation

  • Exit and migration capability without lock-in
  • EU-based skills, support and operations
  • Complete technical documentation and source transparency; control of critical subcontractors

SOV-5: Supply Chain Sovereignty

Resilient, traceable supply chains

  • Transparency on hardware origin, firmware, embedded code
  • Software origin, packaging and updates under EU control
  • SBOM transparency and audit rights along the chain

SOV-6: Technology Sovereignty

Openness and interoperability

  • Standardized, non-proprietary APIs/protocols
  • Open source accessibility (audit, modification, redistribution)
  • Transparency on architecture, data flows, dependencies; minimal lock-in

SOV-7: Security & Compliance Sovereignty

EU-based security operations

  • Relevant EU certifications (ISO, ENISA), GDPR/NIS2/DORA
  • SOC/IR teams in the EU; customer access to logs/alerts
  • EU-compliant incident reports, patch autonomy, independent audits

SOV-8: Environmental Sustainability

Sustainable, resilient operational capability

  • High energy efficiency (PUE), circular economy
  • Transparent emissions and water metrics; high renewable energy share
  • Long-term operational capability under climate considerations

Contributing Factors: What Exactly is Evaluated

Each objective is measured via Contributing Factors. Weaknesses in individual factors can significantly lower the overall level of an objective.

SOV-1: Strategic – Factors

  • Decision bodies: Headquarters/control in the EU

  • Change of Control: Protection against non-EU takeover
  • Financing: EU capital, no critical non-EU investors
  • Value creation: Jobs, development, operations in the EU
  • EU priorities: Contribution to digital goals
  • Continuity: Continued operation under external pressure

SOV-2: Legal & Jurisdictional – Factors

  • Legal system: EU law governing

  • Extraterritorial access: Shielding (CLOUD Act, FISA etc.)
  • Access channels: No non-EU channels
  • Export control: EU-compliant
  • IP jurisdiction: EU law
  • Court venue: EU courts

SOV-3: Data & AI – Factors

  • Customer key sovereignty: BYOK/BYOHSM, no escrow

  • Data access audit: Complete, reliable logs
  • EU data localization: Without fallbacks
  • AI transparency: Auditable models/pipelines
  • Deletion proof: Cryptographic, verifiable

SOV-4: Operational – Factors

  • Exit capability: Standardized runbooks, complete exports

  • EU skills: Support/operations by EU teams
  • Documentation: Architecture, runbooks, IaC
  • Source transparency: Open or full source access
  • Subcontractors: EU-based, documented, auditable

SOV-5: Supply Chain – Factors

  • Hardware origin: Manufacturing/firmware/embedded code documented

  • Software SBOM: Complete, signed
  • Update jurisdiction: Patches/updates under EU control
  • Non-EU dependencies: Minimized, with alternatives
  • Audit rights: Contractually assured

SOV-6: Technology – Factors

  • Open standards: Non-proprietary APIs/protocols

  • Open Source: Audit/modification/redistribution
  • Architecture transparency: Data flows/dependencies
  • Portability: Minimal lock-in
  • HPC independence: EU control over critical resources

SOV-7: Security & Compliance – Factors

  • EU certifications: ISO 27001, ENISA schemes, national standards

  • Regulation: GDPR, NIS2, DORA
  • EU SOC/IR: Teams in the EU
  • Log control: Direct customer access
  • Incident reporting: EU-compliant
  • Patch autonomy: Independent updates

SOV-8: Environmental Sustainability – Factors

  • Energy efficiency: PUE, DC optimization

  • Renewable energy: Certificates/share
  • Circular economy: Recycling/reuse
  • Transparency: CO₂/water/energy public
  • Long-term: Scenarios under climate change

SEAL: Sovereignty Effective Assurance Levels

The framework defines five tiers as a common “currency” for minimum levels per sovereignty objective. Procurers define minimum SEAL per SOV objective; non-compliance leads to bid rejection.

SEAL-0: No Sovereignty

Exclusive non-EU control

  • Services fully controlled by non-EU actors
  • No effective EU jurisdiction or enforceability

SEAL-1: Jurisdictional Sovereignty

Formal EU jurisdiction

  • EU law applies formally
  • Effectively limited by substantial non-EU control over operations, technology or governance

SEAL-2: Data Sovereignty

Enforceable EU law, with dependencies

  • EU law applies and is enforceable
  • Material non-EU dependencies remain
  • Indirect control by non-EU actors possible

SEAL-3: Digital Resilience

Substantial EU control

  • EU law applies and is enforceable
  • EU actors have substantial but not complete influence rights
  • Only marginal non-EU control

SEAL-4: Full Digital Sovereignty

Complete EU control

  • No critical non-EU dependencies
  • Technology, operations, governance and supply chain under complete control of EU actors in EU jurisdiction

Evaluation & Award Criterion

In addition to the SEAL minimum level, a weighted total score is calculated. This multiplies the points achieved per objective by a target weighting and sums across all eight sovereignty objectives – for nuanced differentiation among multiple valid offers.

Calculation Formula

Total Score = Σ (Achieved Points / Max Points) × Weighting across all 8 objectives. Example: For SOV-5, a provider achieves 80 of 100 points → (80/100) × 20% = 16% contribution to total score. The sum across all objectives yields the final sovereignty score (0-100%).

Weighting of Objectives

SOV-1 (15%), SOV-2 (10%), SOV-3 (10%), SOV-4 (15%), SOV-5 (20%), SOV-6 (15%), SOV-7 (10%), SOV-8 (5%). Higher weighting for supply chain, operations and technology; security/compliance considered already well secured.

Evidence-Based Evaluation

Procurers require concrete evidence: contracts, SOC runbooks, key management architecture, data flow diagrams, SBOM/supply chain transparency, audit reports, proofs of EU locations/teams. Public documentation is included.

Contributing Factors

Each objective is evaluated against specific factors – e.g. for SOV-3: BYOK, AI auditability, EU data localization; for SOV-4: exit capability, EU support, complete documentation/source. Material weaknesses lower the SEAL level.

How Procurers Apply the Framework

The framework is designed as a practical tool for public procurement. It combines minimum requirements (pass/fail via SEAL) with nuanced differentiation (award score) – and consistently requires verifiable evidence rather than mere declarations of intent.

1. Define Minimum SEAL

Procurers set a minimum SEAL level for each of the eight SOV objectives – e.g. SEAL-3 for SOV-4/6/7 (operations/technology/security), SEAL-2 for SOV-2/3 (legal/data). Offers that don’t meet a minimum SEAL are excluded.

2. Require Evidence

Bidders must provide hard evidence: contracts with court venue, SOC runbooks, key management architecture, data flow diagrams, SBOMs, ISO scopes, audit reports, proofs of EU locations/teams. Public documentation is included and verified.

3. Calculate Score

For multiple valid offers, the weighted sovereignty score is applied: Per SOV objective, achieved points (relative to maximum) are multiplied by target weighting and summed. The score enables nuanced ranking beyond “yes/no”.

4. Use Question Catalog

The framework provides concrete control questions – e.g. “Where are decision-making bodies located?”, “What key management for customer data?”, “Are there non-EU sub-suppliers?”. These questions form the common thread for submission and evaluation.

Implications for Cloud Providers

The framework shifts focus from mere certification to demonstrable independence, control and exit capability – technically, organizationally, legally. “Sovereign-washing” without real technical/organizational decoupling will likely not achieve SEAL-4.

Opportunity for EU Providers

European providers can directly monetize strengths in openness (standards, open source), EU-based operations, supply chain transparency and data sovereignty – as a measurable advantage in the award score.

What Counts

Verifiable properties: EU-based operations/support/logging (SOV-7), BYOK/HSM and EU data localization (SOV-3), standardized, portable architectures (SOV-4/6), traceable supply chains (SOV-5), governance protection (SOV-1/2).

Risk: Sovereign-Washing

“Sovereignty labels” without substantial technical or organizational shielding will likely achieve at most SEAL-2 in the framework – formal jurisdiction, but material dependencies.

Technical Requirements for SEAL-4

To achieve SEAL-4 (Full Digital Sovereignty) across all eight objectives, concrete technical and organizational measures are required. These go far beyond classic ISO certifications.

Customer Key Sovereignty

BYOK/BYOHSM with complete customer control

  • No provider escrow, no recovery backdoors
  • Cryptographic erasure with verifiable proofs
  • On-premise HSM integration for highest requirements

Exit Capability

Standardized exit runbooks

  • Complete export: container images, Helm charts, IaC code, secrets (encrypted), configurations, databases, object storage
  • Porting to other Kubernetes providers in <48h
  • SCS compatibility for maximum portability

Complete Documentation

Operational documentation

  • Architecture diagrams, data flow schemas, dependency maps
  • Runbooks, IaC code, disaster recovery plans
  • Publicly accessible (open source) or fully transferable to customers
  • No “black boxes”

SBOM & Supply Chain

Software Bill of Materials

  • All platform components with version numbers, licenses, signatures
  • Transparent update processes, chain of trust
  • Automated security scanning
  • Sub-supplier register with jurisdiction and audit rights

EU Data Localization

Strict EU localization without fallbacks

  • All data (runtime, backups, logs, metrics) remains in EU data centers
  • No non-EU admin access
  • Policy-based protection through automated compliance enforcement

EU-Based Operations

SOC/NOC/Support in the EU

  • Incident response by EU teams, no offshore escalation to non-EU entities
  • Direct customer access to logs, metrics and alerts
  • Complete observability platform
  • 24/7 from EU locations

ayedo and the Cloud Sovereignty Framework

Our Managed Services and our Software Delivery Platform systematically fulfill the framework requirements – designed from the ground up for real digital sovereignty of European organizations.

SOV-1: Strategic Sovereignty

Fully EU-based organization

  • Management, decision-making bodies and financing in Germany
  • No non-EU dependencies in governance or ownership structure
  • 100% EU value creation

SOV-2: Legal Sovereignty

German and EU jurisdiction

  • All contracts subject to German law
  • No extraterritorial access obligations
  • GDPR compliance by design
  • Clear legal enforceability

SOV-3: Data & AI Sovereignty

Complete data control

  • Strict EU data localization (Germany)
  • Customer key sovereignty through BYOK/BYOHSM without provider access
  • No non-EU data transfers
  • Full transparency on data flows and AI usage

SOV-4: Operational Sovereignty

Vendor-independent and exit-capable

SOV-5: Supply Chain Sovereignty

Transparent, EU-based supply chains

  • EU data centers with highest certifications
  • Open source software stack with automated security scanning
  • SBOM transparency with complete artifact management

SOV-6: Technology Sovereignty

100% Open Source, standards-based

  • Kubernetes-native stack, standardized APIs (K8s API)
  • Full auditability
  • No proprietary dependencies
  • Open source community participation

SOV-7: Security & Compliance

EU-based security operations

  • ISO 27001, TISAX in preparation
  • SOC/IR teams in Germany
  • Direct customer access to logging and monitoring
  • GDPR/NIS2 compliant
  • Regular security audits

SOV-8: Environmental Sustainability

Sustainable data centers

  • Partner DCs with 100% renewable energy, PUE < 1.3, climate neutral
  • Transparent energy and emissions metrics
  • Long-term resource resilience

Goal: SEAL-4 Across All Objectives

Complete digital sovereignty

  • ayedo is designed to achieve SEAL-4 (Full Digital Sovereignty) across all eight sovereignty objectives
  • Without compromises, without sovereign-washing

Cloud Sovereignty Framework in Regulatory Context

The Cloud Sovereignty Framework is embedded in the comprehensive EU digital/cybersecurity ecosystem. It integrates with NIS2, DORA, CRA, Data Act, GDPR and other EU regulations.

Cloud Sovereignty & NIS-2

Sovereignty as resilience factor

NIS-2 requires BCP/DR and supply chain management for critical infrastructures. The framework evaluates independence and control – directly relevant for NIS-2 supply chain risks and resilience of critical infrastructures. EU-based, sovereign stacks reduce jurisdictional and concentration risks.

More about NIS-2

Cloud Sovereignty & DORA

Digital sovereignty as risk mitigator

DORA requires ICT third-party risk management including exit capability. The framework evaluates exit capability, control and independence – factors that directly address DORA third-party risks. EU-based, sovereign ICT stacks reduce jurisdictional and concentration risks.

More about DORA

Cloud Sovereignty & CRA

Secure, sovereign products

CRA requires security across product lifecycle (Security by Design, SBOM, vulnerability management). The framework evaluates technology sovereignty (SOV-6): open standards, open source, transparency. Together: secure EU products with open standards, transparency, exit capability – without lock-in.

More about CRA

Cloud Sovereignty & Data Act

Portability and lock-in prevention

The Data Act requires technical/contractual measures against vendor lock-in – directly relevant for framework evaluation of operational sovereignty (SOV-4). Interoperability and standardized interfaces become the regulatory standard. Open standards, exit strategies = maximum control.

More about Data Act

Cloud Sovereignty & GDPR

Data protection as sovereignty enabler

GDPR requires data protection, security (Art. 32), protection for third-country transfers (Chapter V). The framework evaluates data/AI sovereignty (SOV-3): EU data localization, customer key sovereignty, exit capability. EU-only stacks with BYOK = GDPR-native.

More about GDPR

CIGREF Trusted Cloud v2 & Gaia-X

European predecessors & initiatives

CIGREF Trusted Cloud (France) as reference model for trusted cloud services. Gaia-X as European data infrastructure initiative. The EU framework builds on CIGREF principles, adopts Gaia-X principles on transparency, portability, interoperability and makes them procurement-relevant with operationalizable evaluation criteria and SEAL levels.

National Sovereignty Strategies

EU-wide harmonization

“Cloud de Confiance” (France), “Sovereign Cloud” (Germany), national strategies in NL/BE/IT. The framework harmonizes national approaches into a unified EU-wide evaluation matrix – for cross-border procurement. SEAL levels as common currency.

ayedo Compliance Overview

Comprehensive compliance approach

How ayedo systematically addresses Cloud Sovereignty Framework, NIS-2, DORA, CRA, Data Act, GDPR, ISO 27001 and other standards. Certifications, processes, technical measures and audit readiness – find our complete compliance roadmap here.

To overview

Framework vs. Classic Certification

The Cloud Sovereignty Framework goes far beyond classic ISO/SOC certifications. It requires verifiable independence, control and exit capability – not just “security assurance”.

Sovereignty vs. Security

Complementary dimensions

ISO 27001 focuses on information security (processes, controls, risk management). The framework evaluates digital sovereignty: Who controls the provider? Which jurisdiction applies? Are there extraterritorial access possibilities (CLOUD Act, FISA)? How exit-capable are you?

ISO 27001 and sovereignty are complementary – the framework adds the control dimension to security certifications.

Evidence-Based Rather Than Checkbox

Hard evidence rather than declarations of intent

Instead of “yes/no” checklists, the framework requires verifiable evidence: contracts with court venue, key management architecture, SBOMs, data flow diagrams, exit runbooks.

Public documentation is included and verified.

Differentiation via Score

Nuanced evaluation rather than binary decision

Classic procurements are often binary (certified/not certified). The framework enables nuanced ranking via the weighted sovereignty score.

Ideal for best-value procurements with differentiated evaluation.

Detecting Sovereign-Washing

Measurable sovereignty rather than marketing claims

The framework makes “sovereignty labels” without substantial decoupling visible: providers with non-EU control achieve at most SEAL-2, regardless of marketing claims.

Real sovereignty becomes measurable and verifiable.

Start Your Sovereign Cloud Journey

Whether you’re applying the Cloud Sovereignty Framework for procurement or simply want to strengthen your digital independence – we support you with consulting, platform and long-term operations.

Framework Consulting

We help you apply the eight sovereignty objectives to your organization, define SEAL minimum levels and weight award criteria.

Sovereign Platform

Our Managed Kubernetes Platform fulfills the framework requirements out-of-the-box – with complete transparency and control.

Migration & Exit

Already using other cloud providers? We support you with vendor-independent migrations – without lock-in, with complete exit capability.