Cloud Sovereignty + 15 Factor App: The Architectural Bridge Between Law and Technology
TL;DR The Cloud Sovereignty Framework of the EU defines what digital sovereignty aims to achieve – …
Diese Serie erklärt systematisch, wie moderne Software compliant entwickelt und betrieben wird – von EU-Regulierungen bis zur technischen Umsetzung.
Digital sovereignty has long been an abstract concept. This changes with the European Commission’s Cloud Sovereignty Framework. It translates the political demand for European control over digital infrastructures into an operational model that can be measured, audited, and embedded in tenders.
The core of the framework consists of:
Public procurers – and increasingly regulated companies – can thereby bindingly determine which SEAL level is at least required per sovereignty objective. Offers that do not meet the minimum levels are excluded. Higher levels can be included as award criteria in the evaluation.
This turns digital sovereignty from a declaration of intent into a verifiable quality feature – comparable to information security or sustainability standards.
A compact introduction can also be found in our overview of the Cloud Sovereignty Framework.
The eight sovereignty objectives cover the entire value chain of a cloud service – from ownership structures to the energy supply of the data center. Important: No objective can fully compensate for the weaknesses of another. A provider with high technical sovereignty but weak legal shielding remains vulnerable overall.
Strategic sovereignty describes the structural anchoring of the provider in the EU:
In short: In a crisis, those who decide over your platform must not be outside the European legal order.
This is about the question: Which legal order applies bindingly, and who can legitimately access data and systems?
For many organizations, SOV-2 is the core of digital sovereignty – without legal control, all technical measures are only partially effective.
Sovereignty over data and artificial intelligence means:
Particularly in light of the GDPR (effective since May 25, 2018) and upcoming AI regulation, SOV-3 is a central component of modern Compliance.
Operational sovereignty means being able to continue operating or migrating a service without the original provider:
Operational sovereignty creates the decision-making freedom needed in long-term platform partnerships.
This focuses on the supply chain:
SOV-5 links digital sovereignty with classic supply chain resilience.
Technological sovereignty addresses openness and interoperability:
Especially for modern platform strategies around Kubernetes, data platforms, or AI stacks, SOV-6 is crucial.
Security and compliance are viewed here from a sovereignty perspective:
SOV-7 bridges the gap between cloud sovereignty and modern Compliance.
Sustainability is explicitly part of the sovereignty understanding:
The framework thus addresses the question of whether a service is not only secure today but also operationally sustainable tomorrow.
The Sovereignty Effective Assurance Levels (SEAL) define how far a provider fulfills a sovereignty objective. They serve as a common “currency” between procurers and providers.
In practice, they can be interpreted as follows:
SEAL-1 – Basic Transparency:
Initial measures and documentation are present but still have significant gaps. Suitable for non-critical workloads.
SEAL-2 – Basic Protection with EU Focus:
Essential sovereignty aspects are implemented, extraterritorial risks partially addressed, processes are established but not yet fully auditable.
SEAL-3 – High Sovereignty Level:
Clear EU jurisdiction, largely EU-based operations, reliable evidence. Risks from non-EU dependencies are significantly reduced but still present.
SEAL-4 – Complete Digital Sovereignty:
Consistent sovereignty across all relevant contributing factors of an objective, including legal, technical, operational, and organizational measures. Evidence is auditable, processes are established and tested.
SEAL-5 – Strategic Sovereignty at Ecosystem Level:
Sovereignty is anchored not only at the service level but at the entire value chain and ecosystem level. This stage will be particularly relevant for especially critical infrastructures in the future.
Important: SEAL levels are awarded per sovereignty objective. A provider can, for example, achieve SOV-3 (Data & AI) at SEAL-4, while SOV-8 (Environmental) only fulfills SEAL-2.
SEAL-4 is the target state for many organizations – especially where sensitive or critical workloads are operated. From a technical and organizational perspective, this means:
SOV-1 (Strategic):
Ownership and control structures are EU-based, change-of-control risks from non-EU takeovers are addressed contractually and through corporate governance.
SOV-2 (Legal):
EU law is the exclusive jurisdiction for the service. There are no ties to extraterritorial legal regimes, neither through corporate structures nor critical subcontractors.
SOV-3 (Data & AI):
All productive data resides in the EU; keys are fully under customer control (BYOK/BYOHSM). AI models, pipelines, and training data are auditable; deletion is technically and organizationally verifiable.
SOV-4 (Operational):
Exit scenarios are not only contractually agreed but practically tested. Documentation, data exports, and migration paths are available and realistically implementable.
SOV-5 (Supply Chain):
Critical hardware and software components are transparently documented, SBOMs are available. Non-EU components are minimized and their criticality assessable.
SOV-6 (Technology):
The platform relies on open standards, interoperable interfaces, and widely used open-source components. Workloads can be migrated to other infrastructures without proprietary formats.
SOV-7 (Security & Compliance):
Relevant standards are certified, security operations teams are based in the EU, logs and incidents are traceable for customers, audits are conducted regularly.
SOV-8 (Environmental):
Measurable goals and metrics for energy efficiency and emissions are available, externally reviewed, and continuously improved.
SEAL-4 is thus not a label but the result of a consistent interplay of technology, organization, law, and governance.
The Cloud Sovereignty Framework was developed to provide public procurement agencies with a unified tool. In tenders, it can be clearly formulated:
Minimum Requirements:
A minimum SEAL is set for each sovereignty objective (e.g., SEAL-4 for SOV-2 and SOV-3, SEAL-3 for SOV-8). Providers who cannot demonstrate this level are not further considered.
Award Criteria:
SEAL levels exceeding the minimum requirements are weighted in the evaluation. Example: A provider with SOV-5 at SEAL-4 receives more points than a provider with SEAL-3, provided the added value is relevant to the project.
Evidence-Based Evaluation:
Instead of self-disclosures, concrete evidence is required: certificates, architecture documents, legal opinions, exit runbooks, SBOMs, audit reports.
For providers, this creates clarity regarding investments: Those who demonstrably achieve SEAL-4 across multiple objectives are systematically better positioned for future tenders in the EU.
Also
TL;DR The Cloud Sovereignty Framework of the EU defines what digital sovereignty aims to achieve – …
Weekly Backlog #47 — Digital Sovereignty? I have a few questions… Editorial Welcome to a week where …
TL;DR Starting point is a multi-tenant Django SaaS application, which is taken from the first line …