NIS2 in Germany: A Law Between Late Implementation and Structural Half-Heartedness
Germany has transposed the European NIS2 directive into national law with considerable delay. The …

Digital sovereignty has taken a firm place in political strategies, administrative modernization, and IT planning in recent years. In light of geopolitical tensions, growing cyber risks, and international legal conflicts, the question of control over digital infrastructures is no longer abstract. It determines the ability to act, security, and economic stability.
With its new whitepaper, the Center for Digital Sovereignty of Public Administration (ZenDiS) shows how large the gap between marketing promises and actual technical independence is for many cloud offerings. The term “Sovereign Washing” describes a problem increasingly visible in the market: services are advertised as sovereign but fulfill the necessary requirements only to a very limited extent.
This post classifies the contents of the whitepaper, explains the technical backgrounds, and shows why true digital sovereignty is much more than a data center in Europe.
Politics and administration in Germany have used a clear definition for years: Digital sovereignty describes the ability to shape, operate, and further develop digital infrastructures and services independently, securely, and autonomously.
This requires four interconnected dimensions:
1. Data Sovereignty Control over data – including legally secure operation, GDPR compliance, and protection against uncontrolled access by third countries.
2. Technological Sovereignty Inspectable, designable technical foundations: source code, interfaces, standards, update processes.
3. Operative Sovereignty Ability to continue operating systems even in the event of a service provider failure or supply chain interruption.
4. Ability to Switch / Interoperability No vendor lock-in, clear migration paths, open standards.
True digital sovereignty arises only when all of these criteria are met. This is exactly where the problem begins.
Many international cloud providers react to European sovereignty requirements with new labels: “Sovereign Cloud”, “Data Boundary”, “European Cloud”, or “National Cloud”.
These terms suggest independence. However, the whitepaper shows that such offerings often only fulfill partial aspects – especially data sovereignty in the narrower sense, for example through local data centers or European operating models.
What is missing, however, are the central technical prerequisites:
This creates a situation in which customers receive a feeling of sovereignty but remain structurally highly dependent – just packaged differently.
Exactly this is what ZenDiS refers to as Sovereign Washing.
The whitepaper explains in detail why this difference is not only politically but technically relevant. The most important factors:
Modern cloud platforms consist of hundreds of components that receive security-relevant updates daily:
These updates can only be provided by the platform manufacturer itself.
If this software supply chain fails – for example due to geopolitical conflicts, export restrictions, or political decisions – operators lose the ability to operate their platform securely within a few weeks.
The whitepaper cites examples in which even “isolated” operators would only be functional for a few months before security gaps become uncontrollable.
Although many hyperscalers support open standards, central services are deeply proprietary:
Data and workloads can therefore only be migrated with considerable effort – both technically and organizationally.
The EU Data Act (from September 2025) obliges providers to interoperability and switching tools. However, the practical implementation is still open, and the reality of many companies shows: lock-ins persist.
As soon as a service provider is subject to the CLOUD Act or FISA 702, data must be disclosed – even if it is:
Metadata, logfiles, or administration accesses are also affected.
Several cases – including recently account blocks at the International Criminal Court – prove the effectiveness of this regulation.
This legal reality stands in direct contradiction to European data protection law and makes full data sovereignty impossible.
The whitepaper shows that politics and administration are increasingly relying on clearly defined criteria:
In parallel, ZenDiS is developing a sovereignty check to make IT offerings evaluable along transparent criteria.
This makes sovereignty operationalizable – and providers can no longer retreat into vague terms.
Many companies and authorities today assume that “European data centers” or “local cloud operating models” guarantee sovereignty. The technical and legal facts show a different picture.
The central insight of the whitepaper: Sovereignty does not arise through location, but through control.
And control requires:
Technically mature European alternatives have long existed – often simpler and more cost-effective than expected. Open technologies like the Sovereign Cloud Stack or European platform approaches offer verifiable independence instead of marketing-driven promises.
The ZenDiS whitepaper clearly shows that digital sovereignty goes far beyond isolating individual data points. It is a structural feature of digital resilience – and a central factor for the ability to act of the state and the economy.
Proprietary cloud offerings can partially ensure data sovereignty, but no technological or operative independence. They remain legally vulnerable, technically dependent, and strategically risky.
Those who want to achieve long-term stability and true control over their IT infrastructure need transparently designable, interoperable, openly implemented technologies.
Sovereign washing can only be countered with facts – and ZenDiS provides exactly this transparency.
Germany has transposed the European NIS2 directive into national law with considerable delay. The …
The introduction of AI browsers like OpenAI’s ChatGPT Atlas and Perplexity Comet marks the …
The Trojan Horse of the “Sovereign Cloud” Why Europe’s new sovereignty is often …