The Myth of the Secure Cloud:
Why Encryption Alone Is Not Enough Introduction Encryption is considered the pinnacle of modern IT …

In the world of critical infrastructures (KRITIS), “high availability” is not just a buzzword but a legal and societal obligation. Those who operate control systems for electricity, gas, or heating networks work in an environment where failures can have immediate impacts on public supply security.
Many companies feel secure because their platform is redundantly built within a data center (DC): multiple server racks, redundant power supplies, mirrored databases, and a local Kubernetes cluster with multiple control plane nodes. However, this architecture has an Achilles’ heel: it protects against the failure of a component but not against the failure of the location.
As long as a data center is operational, internal redundancy works excellently. But risk analysis for KRITIS-relevant systems must go further. What happens in the event of:
A system that exists only in one place is - no matter how redundantly it is built internally - a Single Point of Failure (SPOF) at the location level. For regulators and auditors (BSI, NIS-2, Federal Network Agency), this clustering risk is increasingly unacceptable.
Regulatory requirements have tightened. It is no longer sufficient to have a backup that can be restored “sometime” in an emergency.
In many historically grown IT landscapes, a second data center (“Location B”) exists, but the failover process is a manual Herculean task:
For a KRITIS platform that processes real-time data, this process is far too slow and error-prone. Relying on manual coordination means having a risk, not a disaster recovery plan.
True fail-safety begins where the location is considered an interchangeable resource. For KRITIS operators, this means shifting from a single-location logic to an Active/Active Multi-Region Model. Here, workloads run simultaneously at least two geographically separated locations. If one location fails, the other takes over seamlessly - ideally without the end-user or connected systems (like SCADA gateways) noticing the switch.
In the next part of this series, we will look at how to solve this problem at the network level so that a failover can succeed without the latency of DNS switches.
Are two availability zones within a cloud provider enough? Often, availability zones are located in the same city or region (e.g., Frankfurt). In a large-scale event (flood, power grid collapse), all zones could be affected simultaneously. For KRITIS, a true geographical distance (e.g., > 100 km) is often required.
Is geo-redundancy too expensive for medium-sized platforms? While the infrastructure costs nearly double, the use of Kubernetes and automation reduces the operational effort for disaster recovery tests and maintenance. The greatest cost risk is the penalty for a prolonged outage or the revocation of the operating license by auditors.
What is the difference between Disaster Recovery and Business Continuity? Disaster Recovery (DR) focuses on recovery after a failure (often with data loss/downtime). Business Continuity (BC) aims to maintain operations despite the failure without noticeable interruption. KRITIS increasingly demands BC.
Can we simply “double” host our existing application? Technically yes, but the challenge lies in data synchronization and traffic routing. An application must be designed or adapted to be “Cloud-Native” to function consistently in a multi-region setup.
How does ayedo support risk analysis? We conduct a technical audit of your current infrastructure, identify single points of failure, and develop a roadmap for a geo-redundant target architecture that is both technically stable and audit-compliant.
Why Encryption Alone Is Not Enough Introduction Encryption is considered the pinnacle of modern IT …
Preparing for an ISO 27001 audit in many companies still resembles a manual Sisyphean task. For …
TL;DR Zero-Trust architecture provides the necessary security and governance foundation for digital …