Keeping it local: Cloud sovereignty a major focus of the future

More data, increased cybersecurity threats, and geopolitical tensions are expected to increase demand for cloud solutions that can operate locally. Meeting this need can protect a company’s reputation, operations, and bottom line.

Ben Stanton

United Kingdom

Paul Lee

United Kingdom

Adam Gogarty

United Kingdom

Gillian Crossan

United States

Kevin Westcott

United States

In 2024, the world is forecast to generate 149 zettabytes of data.1 Cloud makes this scale of data creation and processing possible. A zettabyte, for reference, is a thousand, thousand, thousand, thousand gigabytes. If each byte were a grain of sand, there would be enough to fill every beach on earth almost 20,000 times.2

Cloud is now fundamental and a major industry, forecast at almost US$600 billion in 2023.3 It’s an engine for transformative change and has contributed to improved service delivery, helped enable workforce mobility, and created new frontiers in analytics and artificial intelligence. Cloud computing was founded on the idea that data location doesn’t matter—at least, not as much as economies of scale, or the agility to quickly spin up computing resources on the fly. As the volume, value, and sensitivity of data stored has surged, “cloud sovereignty,” the principal that data stored in the cloud should be subject to the laws of the country in which it physically resides, has become a major focus for policymakers.

In 2024, Deloitte predicts that the national focus on cloud sovereignty will intensify in all developed markets. Therefore, government cloud, a subset of solutions designed to meet the stringent compliance requirements of government agencies, is forecast to surpass US$41 billion in 2024, up 16% over 2023.4 And distributed cloud, which can be a solution to comply with data residency restrictions, is forecast to grow to a US$7 billion market, up from a little over US$4 billion in 2022.5

A brief history of cloud computing

The concept of cloud computing dates to the early days of the internet, with time-sharing in the 1960s6 through to telecom virtual private networks (VPNs) in the 1990s.7 But the mid-2000s marked a paradigm shift with the launch of Amazon Web Services (AWS),8 which brought scalable, on-demand compute to the masses. Google, Microsoft, and others soon followed suit, launching their cloud platforms to cement cloud’s foundational role in modern digital infrastructure.

In the past two decades, companies, governments, institutions, and citizens have gradually moved their data and workloads from private infrastructure (think server racks in an office cupboard) to monolithic cloud data centers. In that time, many also adopted a new breed of “cloud native” applications. As vast quantities of data were stored and transferred across global networks, some governments and companies became concerned about its jurisdiction, governance, and ownership, and the term “cloud sovereignty” started gaining traction.

Legal contradictions cause international frictions

Data localization laws may invariably create operational complexity for global businesses. Regulation tends to change frequently, as countries wrestle with national security, data protection, and new technologies. Companies are expected to be increasingly reliant on data, automation, and AI. They should consider how regulation might change, be invalidated, or added to. Compliance today is essential, as is operational agility. Being able to quickly adapt to changes in the regulatory framework is crucial, as hundreds of countries develop their regulatory positions, each with their own nuances, some of which might be inconsistent with one another.

So far, several attempts at regulating transatlantic data flow between the European Union (EU) and United States have been invalidated by the European Court of Justice (figure 1). In the last decade, there has also been a flurry of sovereignty-linked regulation, such as EU GDPR (General Data Protection Regulation), the US CLOUD Act (Clarifying Legal Overseas Use of Data), and some state-level initiatives like the California Privacy Rights Act (CPRA).

Global businesses, as mentioned, need to navigate variation across localized laws. The CLOUD Act, for example, empowers US authorities to access data stored abroad for select law enforcement purposes, but under GDPR, personal data can only be transferred outside the European Economic Area if given an “adequate” level of data protection.9 If a company releases data in accordance with the CLOUD Act but violates GDPR, it could face hefty fines.10 In some cases, governments can reach bilateral agreements such as one between the United Kingdom and United States,11 but these can take time. Instead, companies often resort to end-to-end encryption, where only the sender and receiver can decrypt the data. This means that while service providers might hand over data to law enforcement, the data would be unintelligible without the decryption keys.

To navigate the complex regulatory landscape, data management is crucial. Companies should understand the variety of data types they have, and which classification of data sits in each system (for example, personal information, payments data, regulated financial information). Companies should also consider their “exit strategy” from any current cloud provider, in case of future sovereignty infringements or a changing regulatory landscape. However, the length of cloud contracts, which can be five or more years, and high egress charges (the price to shift data away from a cloud provider) may inhibit customers from migrating between cloud providers.

Localization is a global challenge

The relationship between the European Union and United States is a high-profile example of how data sovereignty frameworks develop, but it’s not the only one. Around the world, many other nations have developed a stance on localization (this is not an exhaustive list):

Russia: One of the earliest and most rigorous enforcers of data localization, Russia’s Federal Law No. 242-FZ mandates that Russian citizens’ personal data be stored within its borders.12 This has had far-reaching consequences for global companies and brands. For example, LinkedIn has seen access restricted in Russia since 2016, as a consequence of its localization laws.13

China: The Chinese Cybersecurity Law (2017) stipulates that “critical information infrastructure operators” store personal data and important business data gathered or generated in China within Chinese territory.14 China has since consolidated its position on localization with the Data Security Law and Personal Information Protection Law (2021), which enforces classification of data and governs international transfers depending on the classification.15

Saudi Arabia: Saudi Arabia introduced its Cloud Computing Regulatory Framework (CCRF) in 2018,16 which specifies data sovereignty conditions on cloud service providers and enforces data residency for certain types of data. In 2021, it introduced its Personal Data Protection Law, under which citizen personal data can only be transferred overseas under a limited set of conditions.17

Sovereignty concerns are likely to escalate

Data sovereignty is already a prominent theme in international discussions, and its significance is likely to grow. These factors are likely to become more prominent in 2024 and beyond, from tensions between companies and nations regarding personal data, to geopolitics like the Russia-Ukraine war, to cloud complexity, with a blend of hybrid and multi-cloud structures, to data protection and cybersecurity issues. Reliance on data is immense, and cloud will likely be the de facto solution for storing, managing, and analyzing it.

Company vs. state: There is a balance between national security and individual privacy, and high-profile cases have often compelled governments to set assertive jurisdictional boundaries over data. For example, the widely publicized case in 2016 in which Apple refused to bypass the encryption on an iPhone, related to an FBI terror investigation.18 While this case did not cross jurisdictions, it did underscore the complexities of pitting the interests of state security agencies against data privacy rights and the responsibilities of tech companies to protect user data. Similar cases have occurred across jurisdictions, however, such as the 2013 dispute between Microsoft and the US government over data stored in Ireland that was related to a narcotics investigation.19

Geopolitics: Global tensions between major powers have resulted in technology and data becoming arenas for diplomatic and trade skirmishes.20 The Russia-Ukraine war has brought data jurisdiction issues to the fore, with Ukraine quickly migrating critical data like its population register, land and property ownership, tax payment records, and education records to cloud.21 On the other hand, US-based cloud service providers suspended sales in Russia shortly after the invasion.22

Cloud complexity: Initially, cloud was about shifting on-premises operations to a single cloud provider. However, today’s enterprises often leverage multiple cloud platforms simultaneously—an approach known as multi-cloud—to benefit from features of each provider, optimizing costs, performance, and scalability. Another common approach is hybrid cloud—a combination of private (on-premises) and public cloud solutions—to allow data-sensitive applications to remain in-house while other workloads can benefit from the expansive resources of the public cloud. While multi-cloud and hybrid cloud strategies offer flexibility and optimization, they also introduce challenges. Data is dispersed across various environments, potentially across different jurisdictions. Each cloud provider may have data centers in numerous countries, each with its unique data protection regulations. This makes the management and governance of data sovereignty more intricate than ever. It’s no longer about navigating the rules of one country but understanding a complex tapestry of global regulations.

Data protection and cybersecurity: Generative AI, machine learning, and automation (which are often enabled by cloud computing) are likely to become pivotal for business operation, prompting governments to be even more scrupulous when it comes to data jurisdiction. Data breaches have become common, and data localization mitigates risks in some instances. The 2020 SolarWinds hack, which impacted multiple US government agencies, highlighted the vulnerabilities of centralized cloud systems.23 The attack, in which hackers inserted malicious code into a routine software update, showed that security and sovereignty should be addressed across entire supply chains, not just at the individual level. Companies should understand the software-as-a-service and third-party providers their organization uses: which cloud platform they run on, what sort of data they process, what their encryption levels are, and what the risks are. Such incidents make a compelling case for countries to have more control and oversight over data concerning their citizens. Cybersecurity challenges are set to exacerbate: The cost of cybercrime is predicted to be US$14.6 trillion in 2024, more than double the US$6 trillion cost a few years ago in 2021.24

Sovereignty extends beyond geography. It also includes operation and governance. One example is Amsterdam Trade Bank, which was sanctioned by the US government in 2022 over its Russian ownership.25 Its data might have resided in Europe, but the cloud service provider with operational control was US-based and was still able to revoke access to company email accounts and related data. Cloud providers have partnered with local operators to overcome this type of risk, with some governments and other entities demanding that it’s not just enough for the data to reside in a geography; the operator of that cloud infrastructure must also be local.26

As the world becomes more digitally connected, the need to delineate boundaries, ensure security, and protect citizen rights is becoming ever more critical. Emphasis on data and cloud sovereignty is expected to intensify in the coming years, driven by geopolitics, security concerns, and the protection of individual rights.

Sovereignty solutions are an opportunity but also a challenge for cloud providers

Cloud service providers, recognizing the growing importance of data sovereignty, have rolled out various products, services, and features. Government cloud solutions are one example—specialized cloud computing environments tailored to meet the strict regulatory and compliance needs of governmental agencies.

Cloud providers have extended cloud services to the enterprise edge. One example includes a fully managed service that deploys the infrastructure (and therefore, cloud services) to clients’ on-premises location.27 Another allows enterprises to run cloud services from their own data center, ensuring data remains on-premises or within a particular jurisdiction. Cloud service providers tend to offer a portfolio of solutions, to cater to businesses that need to keep data within certain regions due to regulatory requirements.28

Such products are aligned with “distributed cloud,” though all may not be strictly labeled as such. Distributed cloud refers to the distribution of public cloud services to different physical locations, while the operation, governance, updates, and evolution remain the responsibility of the originating public cloud provider. In simpler terms, it’s about bringing the cloud closer to where data is generated and consumed.

While these services offer a range of benefits, including latency, they also come with some drawbacks compared to traditional cloud services, such as:

  • Cost: Distributed cloud solutions often require upfront investments in hardware and infrastructure, as opposed to traditional cloud services, which are pay-as-you-go. Also, even though the main cloud provider manages the software stack, the onsite hardware can lead to additional maintenance costs. Finally, IT teams might need training to manage and operate these new distributed cloud environments efficiently.
  • Complexity: Integrating distributed cloud services with existing on-premises systems can be complex. Operating in a hybrid or multi-cloud mode likely means managing workloads across different environments.
  • Limited services: Distributed cloud offerings might not have the full suite of features available in the central public cloud. Features and updates available in the central cloud might take time to become available on distributed cloud platforms.
  • Constrained scalability: While traditional public cloud services offer virtually limitless scalability, distributed cloud solutions might be limited by the local infrastructure’s capacity. Increasing capacity might necessitate additional hardware investments, whereas in a traditional cloud, it’s often a matter of provisioning more resources through software.
  • Vendor lock-in: Relying on a particular cloud provider’s distributed solution can lead to vendor lock-in, making it challenging to switch providers or use multi-cloud strategies without significant efforts and costs.
  • Performance: The performance of distributed cloud hardware on-premises might not always match the performance of the infrastructure in the cloud provider’s data center. Even with on-premises or edge deployments, there might be scenarios where data needs to traverse to the central cloud, leading to potential network bottlenecks.

For cloud providers, growing demand for sovereign cloud might create an opportunity to sell more high-value services, but on balance, it could chip away at profitability. For them, the economically optimal outcome is to sell hyperscale public cloud in every jurisdiction without restriction. But the fragmentation of global cloud infrastructure, with bespoke architectures tailored to stringent compliance mandates, can lead to higher operational costs, and squeeze margins, even if such services are sold at a higher price. That said, it’s an opportunity for local service providers, as well as traditional hardware vendors, especially as customers increasingly rely on hybrid cloud (and hence need a lot of infrastructure).

The bottom line: Companies should act, not react

For companies operating in today’s global digital economy, adhering to regulations about how data is stored, managed, and processed is critical not only to avoid significant legal repercussions and fines, but also to maintain trust with customers and partners. As geopolitical landscapes shift, regulations may be updated, and concerns over data privacy intensify, a company’s ability to navigate data and cloud sovereignty issues can directly impact its market reputation, operations, and bottom line. Companies should act to best position themselves.

Firstly, they should conduct a comprehensive data audit. This should include identifying data sources, and classifying data based on sensitivity. For instance, personal user data might be treated differently from anonymized analytics data or metadata. Companies should also consider a data residency strategy if they don’t have one. This involves deciding where data will reside based on technical performance needs (like latency) and regulatory requirements, and might mean using local data centers, distributed cloud, or cloud regions. And finally, companies should review their data storage and transfer policies, and ensure data is encrypted, at rest and in transit. If data does cross borders, encryption can offer an added layer of protection against unauthorized access.

Leading practice would also involve investing to understand local regulations, which might involve engaging local experts, and also training staff across multiple departments (e.g., IT, legal, operational), particularly as regulations change and evolve. Beyond that, companies should be as transparent as possible with partners, clearly communicating to customers and supply chains how and where their data is being stored and processed. For supply chains in particular, companies should ensure they understand how and where suppliers store and process data. Finally, companies also need to develop a strategy in case of data repatriation for scenarios where data needs to be moved back from a cloud or foreign server to a local server. If possible, they should ensure any contracts with cloud providers have provisions that allow for changes.

Sovereignty is a journey that should be embedded in current cloud strategies, and all cloud users may need to design and architect for sustainable and sovereign platforms. That journey should include three stages:

  1. Advise, in which a company should define its sovereignty posture, design its sovereignty strategy (which would include data and workload categorization), and develop proofs of concept to prepare for sovereignty.
  2. Implement, in which a company should architect sovereignty and implement data controls.
  3. Operate, in which a company should manage its sovereignty ecosystem, build methods to improve observability and risk monitoring, and consider automation and cost optimization.29

Cloud sovereignty is a major strategic issue for multinational companies. Getting things right can instill greater customer confidence, reduce the risk of legal repercussions, and secure a company’s data assets. And the regulatory landscape is unlikely to stand still. If bytes of data are like grains of sand on a beach, then regulatory changes are the tide that can disrupt, reshape, and wash it away. Companies should ensure compliance and foster trust. One way to do that is to remain constantly vigilant, always learning, and prepared to adapt as the regulatory tide changes.

Figure 1 sources

A.      Ernst-Oliver Wilhelm, “A brief history of Safe Harbor (2000–2016),” International Association of Privacy Professionals (IAPP), accessed November 20, 2023.

B.      Court of Justice of the European Union, “The Court of Justice declares that the Commission’s US Safe Harbour decision is invalid,” press release, October 6, 2015.

C.       European Commission (EC), “EU Commission and United States agree on new framework for transatlantic data flows: EU-US Privacy Shield,” press release, February 2, 2016.

D.      EU, Directive 95/46/EC (General Data Protection Regulation).

E.       US Congress, Clarifying Lawful Overseas Use of Data Act or the CLOUD Act.

F.       Hendrik Mildebrath, “The CJEU judgment in the Schrems II case,” European Parliamentary Research Service (EPRS), September 2020.

G.      EC, “Adequacy decision for the EU-US Data Privacy Framework,” July 10, 2023.

By

Ben Stanton

United Kingdom

Paul Lee

United Kingdom

Adam Gogarty

United Kingdom

Gillian Crossan

United States

Kevin Westcott

United States

Endnotes

  1.  IDC and Statista, “Data volume creation and consumption in the future,” 2020.

    View in Article
  2. All the Trivia, “How many grains of sand are on Earth?,” April 25, 2022; Per C., “Zettabyte,” TechTerms.com, last updated December 15, 2012.

    View in Article
  3. Gartner, “Gartner forecasts worldwide public cloud end-user spending to reach nearly $600 billion in 2023,” press release, April 19, 2023.

    View in Article
  4. Deloitte estimate, based on primary research, and factoring in industry research by IMARC Group, Mordor Intelligence, Straits Research, and Data Bridge market research.

    View in Article
  5. Markets and Markets, Distributed cloud market, August 2022. 

    View in Article
  6. By the early 1960s many people can share a single computer, using terminals . . . these are the first common multi-user systems,” from “Timesharing – the first online communities,” Computer History Museum, accessed November 20, 2023.

    View in Article
  7. Septimiu-Vlad Mocan, “VPN history – Everything you need to know about VPN development over the past 25 years (and a quick glimpse of the future),” TechNadu, February 4, 2020.

    View in Article
  8. Amazon, “Amazon.com launches Web Services, developers can now incorporate Amazon.com content and features into their own web sites; extends ‘welcome mat’ for developers,” press release, July 15, 2002.

    View in Article
  9. US Congress, Clarifying Lawful Overseas Use of Data Act or the CLOUD Act, H.R. 4943, 115th Cong. (2017–2018); European Union (EU), Directive 95/46/EC (General Data Protection Regulation), April 27, 2016.

    View in Article
  10. Klaus Foitzick, “U.S. CLOUD Act vs. GDPR,” activeMind.legal, February 29, 2020.

    View in Article
  11. UK.gov, “UK/USA: Agreement on Access to Electronic Data for the Purpose of Countering Serious Crime [CS USA No.6/2019],” October 7, 2019.

    View in Article
  12. Stanford, “Amending Certain Legislative Acts of the Russian Federation as to the Clarification of the Processing of Personal Data in Information and Telecommunications Networks” July 21, 2014. 

    View in Article
  13. BBC News, “LinkedIn blocked by Russian authorities,” November 17, 2016. 

    View in Article
  14. Jack Wagner, “China’s Cybersecurity Law: What you need to know,” The Diplomat, June 1, 2017. 

    View in Article
  15. Ryan D. Junck et al., “China’s new Data Security and Personal Information Protection Laws: What they mean for multinational companies,” Skadden, November 3, 2021. 

    View in Article
  16. Communications, Space & Technology Commission (CST), “Cloud computing,” accessed November 20, 2023. 

    View in Article
  17. Abdulaziz Al-Bosaily, Masha Ooijevaar, and Dino Wilkinson, “Saudi Arabia issues Personal Data Protection Law,” Clyde & Co., September 26, 2021. 

    View in Article
  18. Tim Bradshaw, “FBI ends stand-off with Apple over iPhone,” Financial Times, April 22, 2016.

    View in Article
  19. Leo Kelion, “Microsoft battles US over warrant for drugs case emails,” BBC News, September 9, 2015. 

    View in Article
  20. Jean Gil Barroca, Alfons Buxo, and Bruno Silva Batista, “Cloud sovereignty: Three imperatives for the European public sector,” Deloitte Insights, 2023.

    View in Article
  21. Tim Anderson, “‘Russian missiles can’t destroy the cloud’: Ukraine leader describes emergency migration,” The Register, November 30, 2022.

    View in Article
  22. Ron Miller, “Amazon, Microsoft and Google have suspended cloud sales in Russia,” TechCrunch+, March 10, 2022.

    View in Article
  23. Saheed Oladimeji and Sean Michael Kerner, “SolarWinds hack explained: Everything you need to know,” TechTarget, November 3, 2023.

    View in Article
  24. Anna Fleck, “Cybercrime expected to skyrocket in coming years,” Statista Technology Market Outlook; National Cyber Security Organizations; FBI; IMF.

    View in Article
  25. Jacob Atkins, “Solvent but bankrupt: How sanctions felled Amsterdam Trade Bank,” Global Trade Review, May 31, 2022.

    View in Article
  26. For example, see Matt Small, “Hyperscaler and VMware sovereign cloud solutions indicate that local partnerships are key to the offering,” Analysys Mason, September 4, 2023.

    View in Article
  27. AWS, “AWS Outposts family,” accessed November 20, 2023.

    View in Article
  28. Google Cloud, “Anthos,” accessed November 20, 2023.

    View in Article
  29. Deloitte, Cloud sovereignty: Unleashing the potential of sovereign cloud: A gateway to resilience and adaptability, 2023.

    View in Article

Acknowledgments

The authors would like to thank Jean Gil Barroca, Robert MacDougall, Lucia Lucchini, and Leslie Wolf of Deloitte LLP, and Vipul Mehta and Kirti Khattri of Deloitte SVCS India Pvt L for their contributions to this article.

Cover image by: Manya Kuzemchenko