accessibility.skipToMainContent
Back to blog
Policy

The Data Sovereignty Illusion: Why "Local Zones" Are Not Enough

US cloud providers promise data sovereignty through local data centers. But if the control plane is in Virginia, your data isn't truly sovereign. Here is why.

by Harm Geerlings
October 20, 2025
28 min read
0

The Geography of a Lie

In the sleek, glass-walled boardrooms of Frankfurt, Paris, and Amsterdam, a comforting fiction has taken root. It is the fiction of the "Local Zone." It tells a simple, reassuring story to CIOs and government ministers alike: if you put your data in a data center physically located on European soil (a nondescript warehouse in the suburbs of Dublin, perhaps, or a bunker near Frankfurt), you are protected. You are compliant. You are sovereign.

This story is told by the world's largest hyperscalers: Amazon Web Services, Microsoft Azure, Google Cloud. It is repeated by procurement officers, validated by expensive consultants, and signed off by compliance teams desperate to check a box. It is the foundation of billions of euros in IT spending across the European Union.

It is also, to put it bluntly, a dangerous illusion.

In 2025, physical location is the least important factor in data sovereignty. It is a relic of a time when data was physical paper in a filing cabinet. In the digital age, the physical drive where your data rests might be in a server rack in Dublin, but if the identity management system that controls access to it runs in Virginia, you are not sovereign. If the support team that fixes the server answers to a manager in Seattle, you are not sovereign. And if the encryption keys that lock your data are ultimately manageable by a US entity subject to the CLOUD Act, you are certainly not sovereign.

We are building our critical infrastructure (our energy grids, our healthcare systems, our banking ledgers, our defense logistics) on a foundation of sand. We have confused "residency" with "sovereignty." And in a world of increasing geopolitical instability, that confusion could cost us our independence.

This is not paranoid speculation. This is not anti-American sentiment. This is a cold, technical analysis of how modern cloud infrastructure actually works, and what that architecture means for European autonomy. The truth is uncomfortable, but ignoring it is far more dangerous than confronting it.

The Local Zone Illusion: Where Your Data Really Lives Physical location vs. actual control in US hyperscaler cloud deployments US CONTROL PLANE Northern Virginia / Seattle / Oregon Identity & Access Master Keys (KMS) Billing & Metering Software Updates Resource Scheduler Support Access Global Telemetry & Monitoring Subject to: CLOUD Act, FISA 702 US courts have full jurisdiction EU "LOCAL ZONE" Frankfurt / Dublin / Amsterdam Compute (VMs, Containers) Physical servers in EU datacenter Storage (S3, Databases) Data encrypted at rest... with US-managed keys Network (CDN, Load Balancers) Illusion: "Data stays in EU" Reality: Control remains in US Auth requests Key operations Telemetry data If the Control Plane is unreachable, your "sovereign" data becomes inaccessible

The Anatomy of the Cloud: Muscle vs. Brain

To understand why the "Local Zone" model fails, you have to look past the marketing brochures and understand the architecture of the modern public cloud. We tend to think of the cloud as a collection of servers (compute) and hard drives (storage). But these are just the muscle. The "brain" of the cloud is the Control Plane.

The Control Plane is the centralized software layer that orchestrates everything. It decides who gets to spin up a virtual machine. It decides who gets to access a database. It manages the billing. It pushes the software updates. It holds the master keys. And crucially, for the major US hyperscalers, this Control Plane is a global, unified system. It is not federated; it is centralized. And it is almost invariably controlled from the United States.

When a European bank deploys its core banking system to a "sovereign" region of a US hyperscaler, they are effectively renting a room in a massive hotel. They can lock the door to their room, sure. They can bring their own furniture. But the landlord controls the building's security system, the electricity, the water, the elevators, and (crucially) the master key that overrides all others.

Let us be specific about what this Control Plane actually includes:

Identity and Access Management (IAM): Every request to do anything in the cloud requires authentication and authorization. When you log in, when you create a resource, when you access a database, the request goes to the IAM system. For most hyperscalers, this system runs in US data centers. Even if your compute is in Frankfurt, your authentication request might travel to Virginia and back.

Key Management Service (KMS): Encryption is only as good as key management. The hyperscaler's KMS holds or manages the cryptographic keys that encrypt your data. Even "customer-managed keys" typically pass through the provider's KMS infrastructure during cryptographic operations.

Resource Scheduler: The system that decides which physical server your workload runs on, how to allocate memory and CPU, and when to move workloads between machines. This is deeply integrated into the global platform.

Billing and Metering: Every resource you use is tracked, measured, and billed. This telemetry data flows to central systems, providing the provider with detailed visibility into your usage patterns.

Software Updates and Patches: The hypervisor, the container runtime, the managed database engine: all of these receive automatic updates pushed from central infrastructure. You cannot opt out without losing security patches.

This centralization creates two distinct risks: the Technical Risk and the Legal Risk. Both are severe. Both are underappreciated. And both are getting worse, not better.

The Technical Risk: The US-East-1 Dependency

The technical vulnerability of this architecture is not theoretical; it has been demonstrated time and again. Experienced cloud engineers know the joke: "When US-East-1 sneezes, the internet catches a cold." US-East-1 (Northern Virginia) is the primary region for many AWS services, and often hosts the global control plane for specific features.

We have seen multiple instances where outages in Virginia have taken down services in EU-West (Ireland) or EU-Central (Frankfurt). Why? Because the local region in Europe could not authenticate users, or could not provision new resources, because it lost contact with the "Mothership" in the US. If a fiber cut, a software bug, or a cyberattack in Virginia can stop your business in Berlin, your business is not sovereign. You are tethered.

Consider the December 2021 AWS outage. A networking misconfiguration in US-East-1 took down not just services in that region, but cascading failures affected AWS customers globally. European companies running "EU-only" deployments found themselves unable to access their dashboards, unable to provision new resources, and in some cases unable to authenticate to their own systems.

Or consider the October 2022 Azure outage, where a configuration change in central infrastructure caused authentication failures across multiple regions. European customers could not log in to Azure Portal even though their data and compute resources in European data centers were technically operational. The muscle was fine; the brain was offline.

True sovereignty requires the "Internet Pull Test." If you were to physically cut the fiber optic cables connecting Europe to the United States, would your digital infrastructure continue to function? For most European companies running on US clouds, the answer is a terrifying "No." They would lose the ability to log in (Identity and Access Management often phones home), the ability to scale (Control Plane unreachable), and potentially the ability to decrypt data (Key Management Service unreachable).

This is not a far-fetched scenario. In times of geopolitical crisis, undersea cables have been damaged (accidentally and deliberately). Sanctions regimes can cut off network connectivity. Cyberattacks can target backbone infrastructure. A sovereign system must be able to operate through these scenarios, not collapse because of them.

The Legal Risk: The Long Arm of US Law

The legal dimension is even starker than the technical one, and it is where the "Local Zone" marketing falls apart completely. The United States has a legal framework that explicitly rejects the idea of data sovereignty based on physical location.

The CLOUD Act: Extraterritoriality Encoded

The US CLOUD Act (Clarifying Lawful Overseas Use of Data Act), passed in 2018, was a game-changer. It was designed to solve a specific problem for US law enforcement: they wanted data held by Microsoft in Ireland, and Microsoft refused to hand it over, arguing it was under Irish jurisdiction. The CLOUD Act mooted that argument.

Under the CLOUD Act, US law enforcement can compel any US-based technology company (or any company with a "sufficient nexus" to the US) to turn over data they control, regardless of where that data is stored. It does not matter if the server is in Paris. It does not matter if the subsidiary holding the data is an Irish Limited Liability Company. If the parent company is American, the data is within reach of US courts.

This is extraterritoriality encoded into law. It treats American tech companies as extensions of the American state, with the power to reach into foreign jurisdictions and extract information without going through the traditional Mutual Legal Assistance Treaty (MLAT) process.

The CLOUD Act does include provisions for foreign government objections. A provider can challenge an order if it believes compliance would violate another country's law. But these challenges are expensive, time-consuming, and often unsuccessful. The default position is compliance with US law.

FISA 702 and Upstream Surveillance

Beyond standard law enforcement, there is the realm of national security. Section 702 of the Foreign Intelligence Surveillance Act (FISA) allows US intelligence agencies (like the NSA) to compel US electronic communication service providers to assist in the surveillance of non-US persons located outside the United States.

This is not about catching criminals; it is about foreign intelligence. "Foreign intelligence" is a broad term that can encompass everything from terrorism to trade negotiations, diplomatic strategies, and industrial capabilities. Under FISA 702, a US cloud provider can be ordered to intercept communications or data. Crucially, they are often gagged from disclosing that such an order exists.

The scope of FISA 702 is vast. According to declassified reports, tens of thousands of targets are surveilled annually. And "targets" can include not just individuals, but email addresses, phone numbers, and digital selectors that could match many innocent communications.

The European Court of Justice (ECJ) is well aware of this. In the landmark Schrems II ruling in 2020, the ECJ invalidated the "Privacy Shield" data transfer agreement between the EU and the US. The court's reasoning was explicit: US surveillance laws (FISA 702, EO 12333) are disproportionate and do not provide European citizens with actionable rights. Therefore, the US does not offer "adequate protection" for personal data as required by the GDPR.

The EU-US Data Privacy Framework, adopted in 2023, attempted to address these concerns. But critics argue it is largely cosmetic, and another Schrems challenge (Schrems III) is widely expected. The fundamental incompatibility between US surveillance law and European privacy law has not been resolved; it has merely been papered over.

So we have a situation where European companies are using US clouds to store sensitive data, pretending it stays in Europe to satisfy internal compliance, while the highest court in Europe has ruled that the US legal framework makes that data unsafe. It is a cognitive dissonance of epic proportions. It is a compliance time bomb waiting to explode.

The Legal Reach: US Laws vs. European Data How American law extends jurisdiction regardless of data location CLOUD Act (2018) • US providers must disclose data regardless of location • Applies to subsidiaries and affiliated entities • Foreign law objections rarely successful • No notification to affected parties required FISA Section 702 • Targets non-US persons outside US • "Foreign intelligence" broadly defined • Gag orders prevent disclosure • Tens of thousands of annual targets Schrems II (ECJ, 2020) "US surveillance laws are disproportionate. US does NOT offer adequate protection for EU personal data." Result: European companies using US clouds are in legal contradiction Claiming GDPR compliance while using infrastructure ruled inadequate by Europe's highest court

The "Break Glass" Backdoor

Cloud providers are not ignoring this problem. They know it is a sales blocker. So they counter with "Sovereign Cloud" offerings. They claim "Operational Sovereignty." They say: "Only EU personnel have access to your data." They set up impressive-sounding legal structures, independent trustees, and shell companies.

These offerings go by various names: AWS Sovereign Regions, Azure Sovereignty Services, Google Sovereign Cloud, Oracle Sovereign Cloud. They promise European-only operations, European-only personnel, and sometimes even partnership with European entities to create legal barriers to US jurisdiction.

But if you dig into the Service Level Agreements (SLAs) and the fine print of the technical documentation, you will almost always find a "Break Glass" provision. This is a clause that allows the global (US) support team to access the local infrastructure in the event of a "critical incident," "technical emergency," or "security threat" that the local team cannot handle.

From a security engineering perspective, a "Break Glass" mechanism is a backdoor. It is a privileged access path that bypasses the standard controls. And who decides when to break the glass? The provider. Who defines what constitutes a "critical incident"? The provider.

In a geopolitical crisis (a trade war, perhaps, or a sanctions dispute), that "Break Glass" mechanism becomes a strategic vulnerability. A foreign government could theoretically compel the provider to "break the glass" not to fix a server, but to exfiltrate data, enforce sanctions, or disrupt operations.

Even without malice, the "Follow the Sun" support model poses a risk. When a complex database corruption issue occurs at 3 AM in Frankfurt, the local support team might not have the deep expertise to fix it. They escalate it to the core engineering team. Where is that team located? Usually Seattle or Silicon Valley. To fix the issue, the Seattle engineer needs logs, memory dumps, and perhaps access to the data volume. The moment that access is granted, sovereignty is breached.

The core engineering teams for these platforms are not being duplicated in Europe. It would be prohibitively expensive to maintain separate development teams in each region. The expertise, the source code, the debugging tools: they remain centralized in the United States. And that centralization creates an irreducible dependency.

The Economic Pressure: Why This Matters Beyond Compliance

Some readers might think: "This sounds like a compliance and legal risk. My company is not in a regulated industry. Why should I care?"

The answer is economics. And increasingly, geopolitics.

Cloud provider lock-in creates significant switching costs. Once your data is in a platform, once your applications are built on its services, once your team is trained on its tools, moving becomes extraordinarily difficult and expensive. Estimates suggest that migrating a significant cloud deployment can cost 3-5x the annual cloud spend and take years to complete.

This lock-in gives providers enormous pricing power. Hyperscalers have been steadily increasing prices, knowing that customers have limited alternatives. When AWS raises prices on S3 storage or EC2 instances, most customers simply absorb the cost. The switching cost is too high.

Now consider what happens if that lock-in becomes weaponized. What if, in a trade dispute, the US government decides to impose restrictions on cloud services to European companies in certain sectors? What if sanctions are applied to specific industries or companies? What if a future US administration decides to use technology dominance as a geopolitical lever?

These scenarios seemed far-fetched a decade ago. They seem much less far-fetched today. We have seen technology used as a tool of international pressure (Huawei sanctions, semiconductor export controls, SWIFT disconnection for Russia). The precedents are established. The playbook exists.

A company with sovereign infrastructure has options. A company locked into a foreign cloud has vulnerabilities. This is not just a compliance consideration; it is a strategic risk management issue.

True Sovereignty: The Dweve Definition

At Dweve, we believe the term "sovereignty" has been diluted to the point of meaninglessness. We need to reclaim it. We need a rigorous, engineering-based definition of sovereignty, not a legalistic one.

For us, a system is only sovereign if it meets three hard criteria. These are not "nice to haves"; they are binary pass/fail tests.

The Three Pillars of True Sovereignty Dweve's engineering-based definition: all three required, no exceptions 1 Technical Autonomy "The Disconnected State" ✓ Local control plane ✓ Local identity provider ✓ Local key management ✓ Local consensus mechanism ✓ Offline operation capable ✓ No foreign dependencies Test: "Internet Pull Test" Can you cut the transatlantic cables and keep working? Dweve: YES 2 Legal Immunity "The Jurisdictional Shield" ✓ EU-domiciled entity ✓ No US parent company ✓ No controlling US investors ✓ EU-only board governance ✓ No "sufficient nexus" to US ✓ EU law exclusive jurisdiction Test: "CLOUD Act Test" Can a US court compel you to hand over customer data? Dweve: NO 3 Cryptographic Control "HYOK over BYOK" ✓ Customer-owned HSMs ✓ Keys never leave premises ✓ Provider cannot decrypt ✓ TEE for computation ✓ Mathematical impossibility ✓ Post-quantum ready Test: "Court Order Test" Can you truthfully say "we cannot access that data"? Dweve: YES All three pillars required. Missing any one means you are NOT sovereign, regardless of marketing claims.

1. Technical Autonomy (The Disconnected State)

The system must be capable of full operation without any connection to a central, foreign control plane. This means the "brain" of the system (the scheduler, the identity provider, the key manager) must be local to the deployment.

Most public cloud stacks fail this test immediately. They require constant connectivity to the global Control Plane for billing, identity, and management. Dweve is designed differently. Our architecture is edge-first and decentralized. Each Dweve cluster is a self-contained universe. It has its own local consensus mechanism, its own local identity store, and its own local control logic.

You can run a Dweve cluster in a submarine, a secure bunker, or a factory floor disconnected from the internet, and it will function indefinitely. It will essentially treat the lack of internet as a network partition and keep working. You can provision new resources, update models, and manage users locally. When connectivity is restored, it can sync (if you want it to), but it never needs to.

Our Mesh architecture demonstrates this principle in practice. Dweve Mesh is a distributed AI execution fabric with multiple node types (Compute, Validator, Storage, Orchestrator) that can operate independently or as part of a larger network. Each node has full local capability. The network enhances functionality but is not required for core operations.

2. Legal Immunity

The entity that operates the infrastructure must be immune to extraterritorial data requests. This means it cannot be a subsidiary of a company subject to the CLOUD Act or FISA 702. It must be a European entity, subject only to European law.

This is why Dweve is domiciled in the EU, with no US parent company and no US investors holding controlling stakes. We are not anti-American; we love American innovation. We are pro-sovereignty. We cannot be compelled by a foreign court to betray our customers because we are simply not subject to their jurisdiction.

Our governance structure is designed to maintain this independence. Our board consists of European nationals. Our shareholder structure excludes entities that would create jurisdictional exposure. We do not operate US subsidiaries that could become leverage points.

3. Cryptographic Control (HYOK > BYOK)

Encryption is only as good as the key management. The industry standard "Bring Your Own Key" (BYOK) is a misleading term. In a BYOK model, you generate a key and upload it to the cloud provider's Key Management Service (KMS). The provider's software then uses that key to encrypt and decrypt your data.

This means the provider has the key. It might be in memory only for a millisecond, but it is there. If the provider's software is compromised, or if they are compelled to modify their software to capture the key, your data is exposed. You are trusting the provider not to peek.

True sovereignty requires "Hold Your Own Key" (HYOK). In this model, the keys never leave your Hardware Security Module (HSM) which remains on your premises. The cloud provider never sees the key. Cryptographic operations happen inside a Trusted Execution Environment (TEE) or locally.

Dweve's architecture is built on this principle. Our cryptographic layer includes homomorphic encryption capabilities (BFV scheme with SIMD batching), secure multi-party computation (Shamir secret sharing), zero-knowledge proofs (Bulletproofs), and post-quantum cryptography (Kyber KEM). We do not hold your keys. We do not want your keys. If we receive a court order, we want to be able to honestly say: "We cannot help you. The data is mathematically inaccessible to us."

The Strategic Imperative

This discussion is often framed as a compliance issue: how to avoid GDPR fines. But that is a shortsighted view. This is about strategic survival in the 21st century.

We are entering an era of "technological mercantilism." Nations are using technology stacks as levers of geopolitical power. Supply chains are being weaponized. Semiconductors, AI models, and cloud infrastructure are the new oil, steel, and shipping lanes.

Europe learned a painful lesson about dependency with energy after the Russian invasion of Ukraine. We realized too late that building our entire industrial economy on cheap gas from a single, potentially hostile supplier was a catastrophic strategic error. We spent billions and suffered a massive economic shock to uncouple ourselves.

We are now in danger of repeating that exact same mistake with our digital infrastructure. We are building our digital economy (our AI, our data lakes, our smart cities) on the proprietary infrastructure of a single foreign power. Relying on a foreign Control Plane for your critical infrastructure is strategic negligence.

The numbers are stark. European companies spend over €50 billion annually on US cloud services. That is €50 billion leaving the European economy, creating dependency, and building American competitive advantage. Meanwhile, European cloud providers struggle to compete, lacking the scale and network effects of the hyperscalers.

The AI Act, DORA (Digital Operational Resilience Act), NIS2 (Network and Information Security Directive), and other European regulations are beginning to address these risks. But regulation alone is not enough. We need actual alternatives. We need European infrastructure that can compete on capability while maintaining sovereignty.

The Path Forward

The "Local Zone" is a comfortable illusion. It allows us to pretend we have solved the problem without doing the hard work of building true independence. But illusions, no matter how comforting, eventually shatter.

The path forward requires uncomfortable honesty:

For enterprises: Audit your cloud dependencies with sovereignty in mind. Apply the Internet Pull Test, the CLOUD Act Test, and the Court Order Test to your infrastructure. Identify critical workloads that require true sovereignty and develop migration paths.

For policymakers: Move beyond data residency requirements to data sovereignty requirements. Recognize that physical location is a necessary but not sufficient condition. Develop certification frameworks that test for technical autonomy, legal immunity, and cryptographic control.

For the technology industry: Build actual alternatives. The market opportunity is enormous, and the strategic need is urgent. European digital sovereignty requires European digital infrastructure.

It is time to build infrastructure that is real. Infrastructure that stands on its own two feet. Infrastructure that is truly, technically, and legally sovereign. That is the mission of Dweve.

Our platform is designed from the ground up for true sovereignty. European data centers in the Netherlands, Germany, and France. No foreign control planes. No "Break Glass" backdoors. No jurisdictional exposure. Full GDPR compliance built in from the foundation. Technical autonomy that passes the Internet Pull Test. Cryptographic architecture that makes data access mathematically impossible without customer consent.

This is not about nationalism or protectionism. This is about prudent risk management in an uncertain world. This is about building the digital infrastructure that European businesses and citizens deserve: infrastructure that is controlled by Europeans, for Europeans, under European law.

The illusion of the Local Zone has served its purpose: it allowed enterprises to defer hard decisions while appearing to address sovereignty concerns. But that deferral period is ending. The geopolitical tensions are intensifying. The regulatory requirements are tightening. The strategic risks are becoming impossible to ignore.

It is time to move from illusion to reality. It is time to build truly sovereign infrastructure.

Dweve builds truly sovereign AI infrastructure for European enterprises. Our architecture passes all three sovereignty tests: technical autonomy (disconnected operation capable), legal immunity (EU-only jurisdiction), and cryptographic control (HYOK key management with post-quantum readiness). Our Mesh platform provides distributed AI execution with privacy-preserving federated learning. Our Fabric dashboard offers complete transparency into AI operations. No "Break Glass" backdoors. No foreign Control Planes. No illusions. Real sovereignty, engineered from the ground up.

Tagged with

#Data Sovereignty#Cloud Act#EU Regulation#Infrastructure#Security#Compliance#Geopolitics#Cybersecurity

About the Author

Harm Geerlings

CEO & Co-Founder (Product & Innovation)

Building the future of AI with binary neural networks and constraint-based reasoning. Passionate about making AI accessible, efficient, and truly intelligent.

Stay updated with Dweve

Subscribe to our newsletter for the latest updates on binary neural networks, product releases, and industry insights

✓ No spam ever ✓ Unsubscribe anytime ✓ Actually useful content ✓ Honest updates only