Digital sovereignty for greater freedom of choice and less dependency
Estimated reading time: 21 minutes
Digital sovereignty determines whether companies remain capable of acting in crises or have to react in a way that is dictated by others. Especially in times of geopolitical tensions and growing dependence on a few technology providers, the question arises: Who actually controls your data, your cloud environments, and your digital processes? This guide shows what digital sovereignty means, why it is indispensable today, and how companies can achieve it step by step.
What is digital sovereignty? A brief explanation?
Digital sovereignty describes the ability to act autonomously and independently in the digital world without having to rely completely on individual external providers. For companies, this means retaining control over their data, IT infrastructure, and digital processes as far as possible.
The focus here is less on self-sufficiency—which is unrealistic for globally networked companies anyway—and more on the goal of securing one's own freedom of choice and not being restricted in one's ability to act by dependencies.
The term itself is derived from the classical understanding of state sovereignty: the ability to make self-determined decisions without external control. For a long time, sovereignty was understood primarily in political terms. Today, it is also applied to the digital world: to states, organizations, and individuals.
Why are digital sovereignty and data sovereignty so important?
In addition to all considerations relating to data security and data protection, digital sovereignty is above all a strategic success factor. It determines whether companies can actively shape their digital future or whether they will be surprised and blocked by external circumstances in an emergency. Several examples illustrate why digital sovereignty is so important right now.
-
Geopolitical risks:
Different jurisdictions such as the EU with its GDPR and the NIS2 Directive, and the United States with the US CLOUD Act, are examples of a conflict of objectives:
While European law focuses on data protection and data sovereignty, the Cloud Act allows US authorities to access all data stored with an American provider in an emergency.
Economic policy decisions can also have immediate effects: tariffs or diplomatic tensions could restrict access to cloud services from one day to the next. An abrupt loss of infrastructure, for example due to political sanctions, would paralyze IT operations in many companies. These scenarios are no longer a theoretical threat, but a real strategic risk. -
Dependencies on cloud hyperscalers:
Cloud services are the backbone of digital processes today. However, those who rely exclusively on a few hyperscalers are giving up some of their freedom of action. Price increases, functional changes, or new contract terms can then hardly be negotiated. In serious cases, there is even the risk of losing access to business-critical systems.
-
Competitiveness, innovation, and crisis resilience:
Digital sovereignty strengthens resilience in crises, opens up room for negotiation, and creates the basis for sustainable innovation. Those who are sovereign can flexibly switch to new technologies, use alternatives, and thus remain competitive in the long term.
Get started in the cloud in just four weeks with the right strategy.
The dimensions of digital sovereignty
Digital sovereignty is not evident in a single area, but in several closely interrelated dimensions. Anyone who wants to remain independent and capable of acting in the long term must keep an eye on infrastructure, data, and key technologies in equal measure.
Infrastructure development
The IT infrastructure forms the foundation of every digital organization. This includes data centers, networks, and cloud platforms. Companies that are too dependent on individual external providers run the risk of losing control over their own processes. In the event of disruptions or provider changes, a concrete Plan B or exit strategy should therefore be developed. Those who prepare technical and organizational alternatives remain capable of acting in an emergency, even if a multi-cloud strategy is not (yet) in place.
Sovereignty therefore means making a conscious decision to make critical systems less dependent on individual providers and designing them in such a way that they remain portable in an emergency. This is the only way to ensure availability even in times of crisis.
Free executive briefing for anyone who wants to secure their digital capabilities!
Control over data
Data is the gold of the 21st century, and sovereignty over it is the basis of digital self-determination. In this context, it is worth distinguishing between different levels of sovereignty:
IT security forms the technical basis, data sovereignty describes operational control over one's own information, and digital sovereignty ultimately describes the overarching strategic goal: the ability to shape the digital value chain in a self-determined manner.
Companies must ensure that sensitive information is not only protected by technical measures such as encryption, but also remains legally secure. The GDPR sets standards for this across Europe. In addition, it addresses aspects such as the protection of trade secrets and intellectual property, both of which are fundamental to a company's competitiveness.
In order to strengthen confidence in data control among European customers, major US providers are currently working on solutions for this market. One example is the promise that only employees based in Europe will manage the cloud services behind the company data. To this end, Microsoft is introducing new services and tools for managing external keys and tools for tracking access to the technical infrastructure located in the cloud.
In addition, there are solutions such as "bring your own key" that allow data to be stored in encrypted form in the cloud, but leave access to the key under the control of the company. Alternatively, data is processed in the cloud but stored locally or with a provider in the EU.
Access to key technologies
Whether cloud services, AI models, or industry-specific software: access to trustworthy key technologies is crucial to remaining competitive. Digital sovereignty does not mean developing everything yourself, but rather securing strategic freedom of choice.
Open-source solutions, European AI models, or software from independent providers are valuable alternatives that reduce dependencies and avoid lock-in effects. At the same time, access to such technologies is itself becoming an important competitive factor.
Debate on digital sovereignty in politics and society intensifies
Until now, we have primarily considered the corporate perspective on the topic of digital sovereignty. However, it has been clear for some time now that digital sovereignty is no longer just an IT issue, but has long since become a political and social leitmotif with corresponding implications. While states are trying to secure their digital capacity to act, companies and citizens are also increasingly coming into focus. This is because digital dependencies have a direct impact on the economy, administration, and everyday life.
Strategies and initiatives in Germany and the EU
In Germany, the federal and state governments have been addressing the issue of how to reduce digital dependencies for years. The CIO Bund (Federal IT Commissioner) is developing strategies for projects and structures aimed at creating modern, secure, and independent IT in public authorities.
At the European level, initiatives such as the European cloud initiative GAIA-X, the European Data Act, and the Data Governance Act are taking center stage. The goal is to build a strong European ecosystem that protects data spaces, strengthens Europe's digital independence, and specifically promotes domestic providers.
GAIA-X aims to create a European counterweight to the well-known hyperscalers. By November 2025, a catalog of around 3,000 European infrastructure services that meet GAIA-X specifications is to be available, according to CISPE, the association of European cloud providers.
Other measures such as NIS2 and the European Data Act, on the other hand, are having a particular impact in sectors such as automotive and healthcare, as they regulate, among other things, access to machine data and the obligations regarding transparency and interoperability of systems.
Legal framework between the EU and the US
A conflict between the legal guidelines in Europe and the United States, home to many prominent hyperscalers, is intensifying the debate. With the GDPR, Europe has created a data protection law that serves as a global benchmark and guarantees strong data sovereignty for individuals and companies.
At the same time, the US CLOUD Act is causing uncertainty: it allows US authorities to access all data held by American cloud providers in emergencies, without regard for the rights of European customers. This creates a potential area of conflict between European law and US legislation, which represents a significant compliance and risk issue for companies.
Milestones for digital self-determination and existing gaps
The first important political milestones have been reached: awareness of digital sovereignty has reached the highest levels, support programs have been launched, and initial alternatives have been created with European cloud initiatives.
However, there are still significant gaps: European providers have comparatively small shares of the global market because most companies continue to rely on the large hyperscalers. There is also a lag in innovation when it comes to the use of artificial intelligence, and implementation is often hesitant in government and small and medium-sized enterprises. Many companies also criticize the complexity of the structures, particularly in the case of GAIA-X.
Obstacles on the path to European digital sovereignty are therefore characterized by three areas:
The dominance of AWS, Azure, and Google Cloud leads to dependencies that are difficult to resolve. Migrations to European clouds are becoming increasingly feasible, but remain technically complex. Europe still has some catching up to do in the race for equivalent functionality and global scalability. Hardware and chips also continue to come largely from outside the EU. The Joint Undertaking for Chips initiative, founded in 2023, is a first step toward promoting the development of modern chip technologies and systems in Europe.
Often, there is no overarching strategy. Different departments use various cloud services on their own initiative, without central control. Culturally, sovereignty requires above all more personal responsibility.
However, this also has operational consequences: those who rely on sovereign platforms instead of well-known hyperscaler PaaS services must build up or purchase more operational know-how themselves, which often conflicts with cost or convenience considerations.
European providers are often dependent on subsidy programs, which have so far fallen short. Public procurement often still favors established providers, which makes it difficult to develop viable alternatives. In the coming years, the massive increase in energy demand fueled by the AI boom is likely to move up the political agenda both nationally and internationally. Here, more capacity must be created more quickly through grid expansion, including in conjunction with other items such as electromobility.
These framework conditions form the context in which companies must develop their own strategies.
What does this mean for companies?
For companies, these considerations are by no means abstract. Political developments can influence which cloud, data, and AI solutions enjoy trust and which do not. The outcome of the 2024 US election alone, for example, triggered great uncertainty and a certain loss of trust in American providers among many companies. The reason for this was not even a specific change in legislation, but simply the prospect of a potentially more volatile new government. At the same time, political initiatives are opening up new opportunities – for example, through the promotion of sovereign cloud environments, open-source projects, or European AI alternatives.
So keep an eye on the political situation, but at the same time develop your own strategies so that you are not dependent on the pace of politics.
Can data sovereignty also be implemented with US providers?
International cloud providers have responded to the growing demand for digital independence. Initiatives such as the AWS European Sovereign Cloud and Microsoft Cloud for Sovereignty are creating models that aim to anchor data storage, control, and jurisdiction entirely in Europe. These solutions enable companies to continue using existing technologies while complying with European data protection and security requirements. For many companies, this is a pragmatic way to strengthen their data sovereignty without having to forego proven technologies.
Nevertheless, there are still restrictions that you should factor into your risk management: Since the parent companies continue to be subject to US law, there is a residual risk from the US CLOUD Act despite European operating structures. In addition, the range of functions and speed of innovation of these sovereign clouds may be lower than that of global variants, even if they come from the same provider.
Companies that place particular emphasis on data sovereignty can counter this risk with hybrid models. This includes, on the one hand, processing more sensitive data via European providers or on-premise solutions. On the other hand, open source-based platforms can be taken into account when selecting cloud services – for example, by using PaaS offerings based on open standards, such as Kubernetes-as-a-Service. This preserves technological independence and makes it easier to migrate workloads to other infrastructures or operate them yourself if necessary.
Ways to achieve greater digital sovereignty in your company
Digital sovereignty cannot be bought like a software package. It is the result of conscious decisions, a clear strategy, and the courage to gradually reduce dependencies. For companies, this means one thing above all else: gaining an overview and identifying and prioritizing specific areas of action.
The first step is to take a critical look at your own IT landscape. A sovereignty assessment shows where data is located, who processes it, and which workloads are particularly sensitive. Only with this transparency can you assess whether your company is already able to operate with sovereignty or would be blocked in an emergency.
Multi- or hybrid cloud models make sense if you don't want to put all your eggs in one basket. This allows you to retain negotiating power and switch services as needed. This diversity requires significantly more administrative effort, but it also provides noticeably more freedom of action and digital self-determination.
The expertise required to build and operate a multi-platform with multiple clouds should not be underestimated. MaibornWolff can support you in your project as a service provider. Together, we can create an environment that works smoothly in the background and is easy for your teams to use in their daily operations.
In the field of AI in particular, there are now serious alternatives to the major US providers. Solutions such as Mistral AI are examples of how European innovation is catching up.
Currently, around 60 percent of typical use cases in companies can already be implemented with European cloud offerings such as StackIT or OVH – and the trend is rising. Through the targeted use of open-source tools, this rate rises to up to 75 percent, as they replicate the functions of hyperscalers and can thus further reduce dependency. It is important to realistically assess the total costs: the actual costs arise less from licenses than from the operation of highly available environments. Therefore, a combination of sovereign European clouds and open-source technologies is the most pragmatic way to break away from non-EU hyperscalers and ensure the ability to act with a Plan B. By using open source to operate a PaaS environment, local operations can be saved and the switch to German or EU-based hosting can be achieved more quickly if necessary.
Technical sovereignty comes from portability. Container technologies, standard interfaces, and infrastructure as code make it possible to move applications and data from one platform to another as needed.
Infrastructure competencies such as secure networks, encryption, identity management, and automation are also important. Only those who have mastered these basic components can build sovereign cloud environments. Multicloud technologies that integrate open-source approaches, such as Azure Arc, can help implement hybrid scenarios without relinquishing control over data and systems.
Recommended reading: In our guide to cloud data warehouses, we show how modern data architectures can be designed to be both scalable and sovereign.
No one has to change their entire IT landscape overnight. A step-by-step transformation is more promising: first secure critical systems, then gradually shift other workloads. This allows digital sovereignty to grow continuously without jeopardizing ongoing operations.
A quick check helps to assess your own level of maturity:
- Do we know where our data is stored and processed?
- Do we know who has access to this data?
- Do we have real alternatives for business-critical applications?
- Is our architecture flexible enough that we could switch providers or operate our systems ourselves if necessary?
- Are we acting in a legally secure manner and with overarching strategic control?
- Do our teams have the necessary skills to implement these measures?
Anyone who discovers gaps here has already identified the first areas for action and can develop a confident digital strategy on this basis.
Well-structured platforms can create competitive advantages
A key lever for corporate success is the establishment of shared platform structures that promote uniform technical and organizational foundations. This prevents individual departments or teams from acting in isolation. A stable technical foundation creates the conditions for optimally pooling competencies and deploying them in the best possible way. There are three main pillars behind this:
- a consistent user experience
- the convenience of a cross-team platform
- an IT team with clear responsibilities to provide support.
Above all, the IT team is responsible for implementing data security guidelines and designing the technical infrastructure in such a way that data can be accessed securely at all times.
This graphic shows what this might look like, using product development as an example.
Digital sovereignty in Europe: Frequently asked questions and answers
The debate surrounding digital sovereignty is often marked by skepticism. Similar arguments crop up time and again, particularly when it comes to European providers or alternatives to hyperscalers. However, many of these arguments can be viewed in a more nuanced way and, on closer inspection, turn out to be myths or at least half-truths.
"European providers are functionally weaker."
There is (still) some truth in this statement. The big hyperscalers score points with their enormous range of functions and computing power. But the crucial question is: Does my company really need every single function?
For many business models, it is sufficient to reliably cover the core functions. In many cases, European providers are already competitive in this area and can map most of the relevant functions. They also offer tangible advantages in terms of data protection and compliance. Open source solutions offer the possibility of replicating missing functions.
Many reservations disappear when companies venture into their first pilot projects. For example, customers were able to quickly achieve noticeable independence through the parallel use of open source solutions without any loss of functionality in their day-to-day business.
"AI from Europe is too weak."
The benchmark is often set incorrectly here. European AI does not have to cover all use cases of global generalists such as OpenAI or Google. It is much more important that European models are used specifically where data protection, domain knowledge, or regulatory requirements are crucial—for example, in healthcare or public administration. Rather than being weaker, European AI is often the more appropriate choice in these scenarios.
"Migration is too complex."
Complexity is not an insurmountable obstacle, but rather a question of approach. Instead of rebuilding everything at once, companies can use proof-of-concepts and pilot projects to determine which systems should be migrated first. Practical experience shows that clear priorities and a step-by-step introduction can limit risks while building valuable expertise within the company.
"Alternatives to well-known hyperscalers are too expensive."
At first glance, hyperscalers often appear to be cheaper. But this calculation is deceptive: aspects such as vendor lock-in or compliance risks can end up costing you dearly later on. At the same time, when comparing prices, it is important to remember that every company has different needs that are factored into the costs of a particular provider—including those of European hyperscaler alternatives. If you know what services you need, you can plan for the long term in line with your requirements and negotiate the best deal.
Opportunities for businesses through data security and digital independence
Ultimately, digital sovereignty is not just a safeguard against risks. It opens up concrete opportunities for companies to strengthen their position in the market and operate more successfully in the long term:
-
Stronger at the negotiating table
Those who do not rely exclusively on one provider automatically have more leeway in contract negotiations. Companies with alternatives can reject terms, compare prices, and assert their interests with greater confidence. For example, if you have a BATNA (Best Alternative to a Negotiated Agreement) up your sleeve, you automatically act from a position of strength. This independence has an external effect and increases your credibility with your partners and customers.
-
Competitive advantages through resilience
Times of political uncertainty and technological upheaval reveal how stable a company really is. Unfortunately, both of these factors are present in the current climate. This makes it all the more important to protect your own processes and data against unforeseen circumstances: companies that rely on secure IT models remain capable of acting even when others are hampered by sanctions, blockades, or price shocks. This creates the opportunity to establish or expand a long-term advantage over competitors who, due to convenience or a lack of foresight, continue to place themselves in risky dependencies.
-
Protection against access and manipulation
Digital independence reduces the risk of becoming a victim of industrial espionage, sabotage, or political pressure. So take control of your own data and operate a sovereign infrastructure to not only protect your own trade secrets, but also maintain the trust of customers and stakeholders in times of crisis.
-
Using data as a value-added factor
Sovereignty over one's own data is the basis for developing innovative business models, from AI-supported applications to data-driven services. Sovereign environments are ideally suited to harness this potential.
-
Pragmatic first steps
Companies don't need to make a big deal out of getting started with more digital sovereignty. Often, it's enough to start by creating transparency: Where is the data located? Which applications and processes are critical? Who is responsible?
An overview of the market situation is also helpful. The tech stack of the major hyperscalers usually offers the benchmark in functionality through broad PaaS offerings, integrated security mechanisms, and high scalability. At the same time, initial targeted measures can be derived on this basis: for example, through a pilot project with a European cloud provider or the development of (additional) internal expertise for sovereign IT.
The goal of using European alternatives must be to achieve comparable service levels without companies having to build and maintain local teams of experts at great expense.
Conclusion & Solutions from MaibornWolff
Digital sovereignty is essential for companies to act independently and actively shape their digital future in an uncertain world. Achieving this is not a utopian dream, but a realistic and practical goal.: Step by step, thanks to clear priorities and conscious decisions.
For companies, this results in a clear call to action: they should start now to identify responsibilities and dependencies, consider alternatives such as open source models and European providers, and strengthen internal expertise in these areas. This will enable them to find the best solution for their individual situation.
There is no single path to digital sovereignty, but you can strengthen the resilience of your business processes and the innovative power of your employees by gaining a competitive edge over competitors who are still putting off addressing this issue.
At the same time, you should consider and examine how much responsibility can be kept in-house or outsourced. MaibornWolff has been supporting companies on this path for over 35 years. With analyses, strategies, and concrete implementation steps that reduce dependencies and ensure the ability to act. The decisive factor here is individual tailoring: solutions always arise in the context of specific business processes, risk appetite, and corporate culture.
Three examples from our service portfolio illustrate this:
- Sovereignty assessments: A thorough analysis shows where a company is already confident and where critical dependencies exist.
- Strategy development for cloud operations: With tailor-made architectures, the organization remains capable of acting even in times of crisis.
- AI consulting and sovereignty check: We conduct a detailed assessment and validation of your AI application scenarios, allowing you to leverage AI opportunities and minimize AI risks.
MaibornWolff not only provides support with technical implementation, but also with sustainable competence building within the company—so that digital sovereignty becomes a reality, step by step.
Achieve digital sovereignty in your company!
Book a free consultation with our experts here.
Digital sovereignty – FAQ
What does digital sovereignty mean for companies in practice?
Digital sovereignty is about acting independently and autonomously in the digital world: Companies should secure their data sovereignty, avoid excessive dependence on individual cloud or AI providers, be aware of alternatives, and be able to switch in good time if a provider fails due to political decisions, sanctions, or economic reasons. You don't have to take everything into your own hands or even develop all the necessary technologies yourself. However, if you are prepared, you can react flexibly and remain capable of acting even in critical situations.
Is digital sovereignty even fully achievable?
Complete independence, i.e., a kind of digital self-sufficiency, is neither realistic nor desirable in a globally networked economy. Modern technologies are developed internationally, and cooperation is important.
The goal is therefore not total isolation, but conscious risk management: reducing dependencies where they could become dangerous, while retaining the ability to make independent decisions. Solutions that comply with current European data protection standards help to achieve this, as does the expansion of functionalities through independent open-source developments.
What role does open source play in digital sovereignty?
Open source solutions can reduce dependencies because the source code is open and can be developed independently. They create transparency, prevent lock-in effects, and make it easier to implement your own or unique requirements.
At the same time, open source is not a panacea. In practice, the best results are achieved through a combination of approaches: European providers, or at least providers that are compatible with European data protection standards, are used for sensitive applications where appropriate, combined with specialized open source solutions and selected global solutions for innovation and scalability.
As a company, do I need to turn my back on hyperscalers immediately?
No, on the contrary: digital sovereignty is a process that grows gradually. Many companies are doing well with a multi-cloud or hybrid cloud strategy. This means that critical data and processes are deliberately secured in sovereign environments, while less sensitive workloads can run flexibly on hyperscalers. This allows companies to benefit from innovation and scalability without surrendering their entire capacity to act to a single provider.
Isn't a sovereign IT landscape significantly more expensive than previous arrangements?
This impression often arises because switching to hyperscaler alternatives such as open source models initially requires a certain investment, and the pricing models of large hyperscalers appear cheaper at first glance. But this calculation is deceptive: long-term vendor lock-in effects and potential compliance risks often also result in high follow-up costs. Therefore, each case should be considered individually. With a well-designed architecture, a sovereign solution can therefore even be the more economical option in the long term.
Why is digital sovereignty such a hot topic right now?
The political situation around the world is making dependencies riskier: The US CLOUD Act gives authorities unrestricted access to data held by American providers, regardless of where it is located. At the same time, trade conflicts and sanctions are increasing pressure on global supply chains.
Added to this is the growing importance of data for AI applications: those who fail to maintain control over their data run the risk of losing their most valuable resource. Companies are therefore increasingly recognizing that digital sovereignty has become a key factor in resilience and competitiveness.
What initial steps can companies take toward digital sovereignty?
The path to digital sovereignty begins with transparency. Companies should:
- Perform analyses of current dependencies.
- Identify critical data and processes that require special protection.
- Evaluate European cloud and open source alternatives and check which workloads can be sensibly operated there.
- Build competencies within the company to independently drive cloud portability and sovereign AI deployment.
In this way, digital sovereignty grows step by step without radical upheavals, but in a sustainable and future-proof manner.
Christian Leinweber is Head of Department in the DevOps&CloudNative division at MaibornWolff, with many years of experience in distributed system architectures, including the design and integration of application landscapes. His passion is the introduction of cloud native systems into structures where not only applications scale, but also the people who build them.