Single Point of Failure Location: Why One Data Center Isn't Enough for Critical Infrastructure
In the world of critical infrastructures (KRITIS), “high availability” is not just a …

Encryption is considered the pinnacle of modern IT security. Data is protected, access is controlled, systems are secured – at least in theory.
In many companies, this has led to a comforting assumption: If data is sufficiently encrypted, regulatory risks can also be managed.
This assumption is dangerous.
Because it overlooks a central tension in modern cloud architectures: Security is not only a technical category but also a legal one.
IT teams think in architectures. In access concepts, key management, Zero Trust models, and end-to-end encryption.
This is understandable – and necessary.
Technical measures are the first and most important defense mechanism against unauthorized access, data loss, and cyberattacks. They can be planned, implemented, and audited.
However, this is also where their limits lie.
Because technical security operates within a system. Legal access possibilities act from outside this system.
Laws like the CLOUD Act or surveillance powers under FISA 702 create a reality where providers can be compelled to provide data.
The crucial point is: These obligations are directed not at the architecture but at the provider.
This means that even highly secured systems can be affected – as long as the operator is legally able to access the data or facilitate its release.
The central question is therefore not: “Are the data encrypted?”
But: “Who controls the keys – and under whose jurisdiction does this entity fall?”
A common counterargument is: Modern architectures rely on concepts like “Customer Managed Keys” or “Hold Your Own Key”. The provider thus no longer has access to the data.
In practice, this picture is often incomplete.
On the one hand, indirect access possibilities still exist – for example, through administration interfaces, metadata, or integration points. On the other hand, providers operate within a legal framework that obliges them to respond to requests from authorities.
Even if technical barriers exist, pressure can be applied at an organizational or legal level.
This makes it clear: Absolute isolation is difficult to achieve in complex cloud ecosystems.
Modern security concepts are essential, but they must be properly contextualized.
Zero Trust reduces the risk of internal misconfigurations and unauthorized access. Encryption protects data from unauthorized access at the transport and storage level. “Sovereign Cloud” approaches attempt to anchor control more firmly with the customer.
All these measures significantly improve the security situation.
But they do not solve the fundamental problem if legal control lies outside one’s own organization.
A system can be technically perfectly secured – and still be subject to external access possibilities.
The discussion about cloud security is often conducted too one-dimensionally. Either technically or legally.
In reality, both levels are interlinked.
A robust security strategy must therefore integrate both perspectives. It must consider how systems are built – and under what legal frameworks they are operated.
This requires closer collaboration between IT, compliance, and management.
Companies must readjust their security strategy.
It is no longer enough to invest in technologies and assume that they automatically cover regulatory risks.
Instead, a conscious combination of:
is needed.
Particularly sensitive data and processes should be operated in environments where these factors can be actively shaped.
Encryption remains a central component of modern IT security. Without it, protecting sensitive data is hardly conceivable.
But it is not a panacea.
Those who think of security solely in technical terms overlook the structural risks of modern cloud usage.
The real challenge lies in understanding control holistically – as an interplay of technology, organization, and law.
Only in this way can a security architecture be created that meets the demands of a connected and regulated world.
In the world of critical infrastructures (KRITIS), “high availability” is not just a …
Preparing for an ISO 27001 audit in many companies still resembles a manual Sisyphean task. For …
TL;DR Zero-Trust architecture provides the necessary security and governance foundation for digital …