Learning Library

← Back to Library

Understanding Sovereign Cloud: Data, Operations, Governance

Key Points

  • As organizations shift essential workloads to hybrid cloud, the cloud becomes critical infrastructure, raising the need to ensure data availability and compliance with jurisdictional rules, which is addressed by the sovereign cloud model.
  • Data sovereignty focuses on protecting privacy (e.g., keeping encryption keys out of the provider’s reach) and guaranteeing that data resides and is processed within specific legal jurisdictions, as illustrated by the fictional “Privacy, Inc.”
  • Operational sovereignty emphasizes continuous availability and regional control of infrastructure—ensuring disaster‑recovery resilience and local management of cloud resources—exemplified by “Always‑On, Inc.”
  • Digital sovereignty involves strict governance and transparency, allowing organizations to audit access, enforce policies, and monitor network flows to meet regulatory requirements, as shown by the “Govern‑It, Inc.” scenario.

Full Transcript

# Understanding Sovereign Cloud: Data, Operations, Governance **Source:** [https://www.youtube.com/watch?v=Chq1LI-3d0A](https://www.youtube.com/watch?v=Chq1LI-3d0A) **Duration:** 00:09:47 ## Summary - As organizations shift essential workloads to hybrid cloud, the cloud becomes critical infrastructure, raising the need to ensure data availability and compliance with jurisdictional rules, which is addressed by the sovereign cloud model. - Data sovereignty focuses on protecting privacy (e.g., keeping encryption keys out of the provider’s reach) and guaranteeing that data resides and is processed within specific legal jurisdictions, as illustrated by the fictional “Privacy, Inc.” - Operational sovereignty emphasizes continuous availability and regional control of infrastructure—ensuring disaster‑recovery resilience and local management of cloud resources—exemplified by “Always‑On, Inc.” - Digital sovereignty involves strict governance and transparency, allowing organizations to audit access, enforce policies, and monitor network flows to meet regulatory requirements, as shown by the “Govern‑It, Inc.” scenario. ## Sections - [00:00:00](https://www.youtube.com/watch?v=Chq1LI-3d0A&t=0s) **Understanding Sovereign Cloud Concepts** - The passage explains the three pillars of sovereign cloud—data, operational, and digital sovereignty—using a fictional company to illustrate concerns about data protection, residency, and control in hybrid cloud environments. - [00:03:09](https://www.youtube.com/watch?v=Chq1LI-3d0A&t=189s) **Risk‑Based Governance for Sovereign Cloud** - The speaker outlines how transparency, governance, and a precision, standards‑based, risk‑based approach allow organizations to tailor control levels for different workloads within a hybrid sovereign cloud environment. - [00:06:15](https://www.youtube.com/watch?v=Chq1LI-3d0A&t=375s) **Public vs Distributed Cloud Deployment** - The speaker contrasts deploying workloads on a public cloud region (e.g., IBM Cloud in Frankfurt) with using a distributed cloud approach that places the platform (like OpenShift) on trusted local or on‑premise infrastructure, emphasizing hybrid cloud flexibility and risk‑based decision making. - [00:09:39](https://www.youtube.com/watch?v=Chq1LI-3d0A&t=579s) **Video Closing Call-to-Action** - The speaker thanks viewers and encourages them to comment, like, share, and subscribe for more content. ## Full Transcript
0:00Businesses and governments around the world 0:03have been adopting hybrid cloud for their digital transformation. 0:07As they move essential applications to the cloud, 0:09the cloud itself becomes critical infrastructure. 0:13Therefore, the concerns and requirements around data availability 0:19and whether they are following the rules and policies in a given jurisdiction become important. 0:24This is where the concept of sovereign cloud comes into play. 0:28There are three concepts and outcomes related to sovereign cloud. 0:35One is around data sovereignty. 0:39Another is around operational sovereignty. 0:43And the third is digital sovereignty. 0:50When you look at these things, 0:52let's think about them and understand them from the perspective of three fictitious companies. 0:57Let's imagine there's a company called Privacy, Inc. 1:03They're worried about their data. 1:05Given cyber attacks, ransomware-- protecting customer information/consumer information 1:10--is reputational risk that they need to handle, right? 1:14So how do you protect the data and make sure when you have access to the data 1:18and you control the keys? 1:20So from that perspective, 1:22that even a cloud provider should not be able to access the data-- that's the aspect of privacy. 1:27The other aspect is residency--data residency. 1:30Is the data stored and processed within the particular region and jurisdiction? 1:35How do you make sure that addresses that? 1:37That's what this company is concerned about, 1:39and that's all about data sovereignty. 1:42Fundamentally, when you look at sovereign cloud, data sovereignty is a fundamental and foundational requirement 1:48that needs to be addressed, and that's a primary one. 1:51Let's go to the second one: operational sovereignty. 1:54Let's think about a fictitious company again, called Always-On, Inc. 2:03Given the importance of these essential and critical applications, 2:06they want to make sure the application and the infrastructure is resilient, 2:11that it is always on, it's available, 2:14even if there is a disaster that happens in a particular region, can you stay up? 2:18That's very important from a disaster recovery/availability perspective 2:23so that you're not dependent on some other infrastructure elsewhere in the world and so on and so forth. 2:29The other aspect that the Always-On, Inc. is worried about is locality. 2:35In terms of infrastructure and people. 2:38Is it in the region? 2:40Are your cloud data centers in the region? 2:41Who is managing and accessing them? 2:43Do you have transparency around it? 2:45So that comes in the context of operational sovereignty. 2:49The third, when you think of digital sovereignty, 2:53let's imagine it in the context of a company called Govern-It, Inc. 3:01You want to govern who has access, what the policies are, what the rules are, that you apply, 3:07that they follow them. 3:09So in terms of governance, it's an important aspect of digital sovereignty. 3:15The other aspect of digital sovereignty is transparency. 3:20You need to know what's going on. 3:22Can you do pooled audits from a regulations perspective? 3:25Can you have visibility to the network flows? 3:28Having transparency at an infrastructure or operational level becomes important. 3:33So those are the three things. 3:35Three outcomes when it comes to sovereignty and sovereign cloud. 3:40And now how do you how do you meet them? 3:43You got to remember, one size does not fit all. 3:46It's not like you need all of them for every workload. 3:50This is where you need to take a risk-based approach. 3:54Because you are balancing on one side growth... 4:04and what are you balancing it with? 4:07It's essentially about risk. 4:09The most critical applications, most critical information. 4:13You may need the highest level of control. 4:15But for a certain set of workloads and applications, you don't need to apply the same stringent rules. 4:20So taking a risk-based approach when it comes to balancing your growth and innovation becomes important. 4:27So it's fundamentally a choice. 4:29So that we encourage more of a precision regulation 4:34and standards-based approach to governance rules and standards. 4:38This way it can be technologically enforced and managed. 4:43We talked about the why and the what. 4:46We talked about the approach. 4:48How do you accomplish it? 4:50So in a hybrid cloud world, 4:52typically these companies, these fictitious companies we are talking about, or the workloads that you're working on, 4:58deals with applications that you're bringing to the cloud and the data. 5:02When it comes to data sovereignty and privacy, 5:04make sure your data is encrypted and managed with keys 5:10that only you have control over and the data itself is in your control. 5:15We have this notion of "keep your own key". 5:18It's not just bring your own key, you keep it, right from hardware. 5:22Control them and you have full control, have technical assurance. 5:25Technologies like confidential computing come into play. 5:28As well as, as it gets to sensitive PII data, you can do field-level encryption, 5:33tokenization, and technology approaches of that sort, 5:36so that you can actually ensure, be it an object store or databases. 5:41And this is even more important as it comes to AI. 5:44You're dealing with sensitive and confidential data. 5:46And your workload protection so that your workloads are up and running. 5:49So when you look at it holistically, taking a data-centric approach is important. 5:56Now, once you define these policies and controls, 5:59a security team and an officer can say, "this is all you need". 6:03But a developer is not a security expert. 6:06How do you then orchestrate them as policy-as-code, 6:08and where do you deploy them? 6:10There are two options you can take, 6:12depending on criticality and risk, and based on the region. 6:16You can take either a public cloud based deployment approach, 6:21where a region, let's say Frankfurt in the EU, 6:27and you look at cloud providers like IBM Cloud having a presence, 6:31you can deploy these workloads, have full control of the data, and deploy them 6:35in an infrastructure and a platform layer like a hybrid cloud platform on top of it. 6:42Like containers and OpenShift 6:43that gives you ability to have an interoperable, consistent and standardized hybrid cloud deployment model. 6:51You leverage them from a cloud perspective. 6:53So that's number one, which is a public cloud model. 7:01Public cloud deployment model in a given region. 7:04The second option is, as you think about more control, 7:09there may be local providers, infrastructure providers that you may trust, 7:13or you may want to deploy it in an on-premise data center. 7:16This is where the notion of a distributed cloud comes into play. 7:22With a distributed cloud, 7:24you're essentially distributing your workload and the platform, like OpenShift, 7:30into the infrastructure of choice that you have control over. 7:34So you make a risk-based decision 7:36on whether you want to consume a public cloud model in a given region that meets your requirements, 7:41or whether you want to deploy on an infrastructure. 7:45So between these, 7:47as you deploy hybrid cloud model from a cloud, 7:52you deploy them and bring them in, in terms of a remote deployment. 7:56This is where a distributed cloud paradigm comes into play. 8:00You deploy your platform in a distributed manner at an edge, on-prem or data center. 8:06So these are two ways that you can deploy, and solution patterns that we observed. 8:12In essence, if you think of data sovereignty, 8:16you're thinking about data privacy and residency 8:19so that in a particular region. You're looking at operational sovereignty 8:25in terms of locality and resiliency. 8:31So based on your deployment model, 8:33you can get the resiliency and plan for your disaster recovery and availability zones 8:39in a way that you have more design around your resiliency and locality. 8:47And, not only you deploy it through policy-as-code, 8:51you have to think about continuous monitoring, continuous compliance. 8:56So if you're thinking about posture management and compliance 8:59so that you're not just doing checkmarks every six months, 9:02you actually have a way to think about in terms of audit reports and continuous monitoring. 9:11You can actually achieve governance and transparency through those techniques and technologies. 9:16Therefore, with these two approaches on how you can achieve it, you have full control of the data, 9:22deployment model that enables you in terms of locality, 9:26and a monitoring and continuous compliance approach on governance, 9:31you can actually achieve your outcomes in terms of sovereign cloud through these two solution patterns. 9:39Thanks for watching this video! 9:41If you want to see more videos like it, please leave a comment below, share your liking, and subscribe. 9:46Thank you.