Assessment criteria
172 criteria across 12 dimensions and 5 maturity levels. Each criterion defines a single testable condition for assessing your organisation's sovereignty posture.
Identity & Access DSCM-IAM complete
L0 Unaware
-
IAM-L0-C1The organisation has no centralised identity directory. User accounts are created ad-hoc per system with no single source of truthEvidence guidance
Review onboarding documentation and system admin interfaces; check whether a directory service (LDAP, AD, cloud IdP) exists
-
IAM-L0-C2Shared or generic accounts (e.g., admin@, info@, root) are used for day-to-day operations, including access to production systemsEvidence guidance
Audit login records and account inventories across critical systems; look for accounts used by more than one natural person
L1 Dependent
-
IAM-L1-C1All user identities are stored and managed in a single cloud-provider IAM service (e.g., Microsoft Entra ID, Google Workspace, AWS IAM Identity Center) with no on-premises or self-hosted fallbackEvidence guidance
Confirm that the identity provider is a SaaS-only service; verify there is no secondary IdP or directory synchronisation to an on-prem store
-
IAM-L1-C2All authentication methods, including multi-factor authentication, are provided and controlled by the cloud identity provider with no organisation-managed alternativeEvidence guidance
Verify that MFA methods (push notifications, TOTP seeds, SMS) are entirely managed within the provider's console; confirm the organisation does not operate any independent authentication factor (e.g., own FIDO2 key management, own TOTP issuer)
-
IAM-L1-C3The organisation has no control over where identity data is stored or processed. Region selection is either unavailable or left at provider defaultsEvidence guidance
Check the IdP's data-residency settings; review the provider's sub-processor list for identity-related data flows
-
IAM-L1-C4The organisation has no independent record of who has access to what. Access inventories exist only within the provider's platform and cannot be exported or verified externallyEvidence guidance
Ask whether the organisation maintains any access inventory outside the provider's console; determine if access data can be exported in a machine-readable format for independent analysis
L2 Contractual
-
IAM-L2-C1A Data Processing Agreement (DPA) is in place with the identity provider that specifies data-residency requirements, sub-processor restrictions, and audit rightsEvidence guidance
Obtain the signed DPA; verify it includes jurisdiction-specific data-residency commitments (e.g., EU-only processing), a sub-processor notification mechanism, and the right to conduct or commission audits
-
IAM-L2-C2SAML 2.0 or OpenID Connect (OIDC) federation is configured between the cloud IdP and all business-critical applications, using organisation-owned domain names and metadata endpointsEvidence guidance
Review federation configurations; confirm the organisation controls the SAML/OIDC metadata URLs and signing certificates, and that relying parties are registered under organisation-owned domains
-
IAM-L2-C3Regular access reviews are conducted using provider tooling, with results exported to an independent system for retention and audit trail purposesEvidence guidance
Request evidence of the last two access review cycles; confirm that review results are archived outside the provider's platform (e.g., in an internal GRC tool or document management system)
L3 Controlled
-
IAM-L3-C1A self-managed identity provider (e.g., Keycloak, Authentik) serves as the authoritative identity source; cloud IdPs consume identities via federation rather than owning themEvidence guidance
Inspect the identity architecture diagram; confirm the self-managed IdP is the master directory and that cloud IdPs (e.g., Entra ID, Google Workspace) are configured as federation targets or downstream consumers via SAML/OIDC
-
IAM-L3-C2Authentication factors for privileged accounts are managed by organisation-controlled infrastructure, not delegated to a third-party provider (e.g., organisation-managed FIDO2 keys or smartcard PKI rather than provider-managed push notifications)Evidence guidance
Confirm that the MFA enrolment, seed generation, and verification for privileged accounts are handled by the self-managed IdP or organisation-owned hardware, not by an external provider's authentication service
-
IAM-L3-C3The organisation can perform a full identity-provider failover or migration without losing user accounts, group memberships, or access policiesEvidence guidance
Request documentation of the DR/migration plan; verify that identity data is regularly exported in a portable format (SCIM, LDIF, or equivalent) and that a failover test has been conducted within the past 12 months
L4 Autonomous
-
IAM-L4-C1All identity infrastructure - directory services, authentication engines, token issuance, and policy decision points - is self-hosted on organisation-controlled infrastructure within a known legal jurisdictionEvidence guidance
Audit the complete identity stack; confirm that no component relies on an external SaaS provider for runtime operation. Verify hosting location through infrastructure documentation and physical or virtual audit.
-
IAM-L4-C2The organisation can authenticate all users and enforce all access policies with zero dependency on external services, including DNS resolution, certificate authorities, or cloud-based MFA providersEvidence guidance
Conduct an isolation test: simulate complete external connectivity loss and verify that internal authentication and authorisation continue to function. Review the dependency map for any external call-outs during authentication flows.
-
IAM-L4-C3Cryptographic material for identity operations (signing keys, TLS certificates, FIDO2 attestation roots) is generated, stored, and rotated using organisation-controlled HSMs or equivalent tamper-resistant hardwareEvidence guidance
Inspect HSM deployment and key-management procedures; confirm that identity-critical keys are generated on-premises, never exported in plaintext, and rotated on a documented schedule
-
IAM-L4-C4The organisation has decentralised identity capabilities (W3C Verifiable Credentials, DID methods) deployed or has a documented, tested implementation plan for inter-organisational trust without relying on a centralised identity brokerEvidence guidance
Review whether DID/VC infrastructure is deployed or a documented implementation plan exists; confirm that the organisation can issue and verify credentials without depending on a third-party identity federation service
Cryptographic Keys DSCM-KEYS complete
L0 Unaware
-
KEYS-L0-C1No formal encryption policy or standard has been defined for data at rest or in transit.Evidence guidance
Request the organisation's encryption policy or information security policy. Absence of any documented encryption requirements satisfies this criterion.
-
KEYS-L0-C2Encryption keys are entirely provider-managed with no organisational awareness of key custody arrangements.Evidence guidance
Interview IT leadership regarding who holds encryption keys and where key material resides. Lack of knowledge or 'the cloud provider handles it' responses confirm this criterion.
-
KEYS-L0-C3No key rotation schedule or key lifecycle management process is in place.Evidence guidance
Request documentation of key rotation policies or automated rotation configurations. Complete absence satisfies this criterion.
L1 Dependent
-
KEYS-L1-C1A basic encryption policy exists that mandates encryption at rest and in transit for production systems.Evidence guidance
Review the organisation's encryption policy or relevant section of the information security policy. Confirm it requires encryption for data at rest and in transit.
-
KEYS-L1-C2Provider-managed encryption services are explicitly identified and documented (e.g., AWS SSE-S3, Azure SSE with Microsoft-managed keys, Google default encryption).Evidence guidance
Request an inventory of encryption services in use. Verify that specific provider encryption mechanisms are named and mapped to workloads.
-
KEYS-L1-C3The organisation acknowledges that key material is held by the provider and has documented this as a known dependency.Evidence guidance
Review risk registers or dependency documentation for explicit acknowledgement that the cloud provider controls key material.
L2 Contractual
-
KEYS-L2-C1The Data Processing Agreement explicitly addresses key management responsibilities, key custody, and conditions under which the provider may access key material.Evidence guidance
Review the DPA for clauses covering encryption key management, key access conditions, and key custody responsibilities. Confirm these are specific rather than generic security references.
-
KEYS-L2-C2BYOK or customer-managed key options have been contractually secured with the provider, even if not yet fully implemented.Evidence guidance
Review service agreements or order forms for BYOK/CMK entitlements. Confirm the organisation has the contractual right to manage its own keys.
-
KEYS-L2-C3A key management procedure documents key lifecycle stages including generation, distribution, rotation, revocation, and destruction.Evidence guidance
Request the key management procedure. Verify it covers the full key lifecycle and assigns responsibilities for each stage.
-
KEYS-L2-C4The provider's technical access to key material has been assessed and documented as a residual risk.Evidence guidance
Review risk assessments or technical architecture documentation acknowledging that BYOK in cloud KMS does not fully eliminate provider access to key material in memory during cryptographic operations.
L3 Controlled
-
KEYS-L3-C1Customer-managed keys (BYOK or HYOK) are implemented for all critical workloads, with key material stored in HSM-backed infrastructure that prevents provider access to plaintext keys.Evidence guidance
Review key management architecture documentation. Verify HSM-backed key storage (e.g., AWS CloudHSM, Azure Dedicated HSM, or third-party HSM) is used rather than standard cloud KMS. Confirm the provider cannot extract plaintext key material.
-
KEYS-L3-C2Encryption key material resides exclusively within EU or Swiss jurisdiction, with no replication to non-EU/non-Swiss locations.Evidence guidance
Request HSM deployment location documentation. Verify that HSM instances and key material are deployed in EU/Swiss data centre regions with no cross-border replication.
-
KEYS-L3-C3Key rotation is automated under customer control, not delegated to the provider.Evidence guidance
Review automated key rotation configurations. Confirm that rotation is triggered by customer-managed automation, not by the provider's default rotation mechanisms.
-
KEYS-L3-C4Key rotation schedules are defined per data classification level.Evidence guidance
Review key rotation schedules and confirm rotation frequency varies according to data classification policy (e.g., more frequent rotation for higher-sensitivity data).
-
KEYS-L3-C5Envelope encryption is implemented, separating data encryption keys (DEKs) from key encryption keys (KEKs) with the KEK under customer-controlled HSM protection.Evidence guidance
Review encryption architecture documentation for envelope encryption design. Verify KEKs are stored in customer-controlled HSMs and DEKs are wrapped/unwrapped using customer-controlled operations.
L4 Autonomous
-
KEYS-L4-C1Self-hosted HSM infrastructure is deployed on-premises or in a customer-controlled data centre, with no dependency on cloud provider HSM services.Evidence guidance
Inspect on-premises HSM deployment (e.g., Thales Luna, Utimaco SecurityServer, Entrust nShield). Verify HSMs are physically located in customer-controlled facilities with no cloud provider involvement in HSM operations.
-
KEYS-L4-C2Key ceremonies for root key generation are conducted on-premises with documented procedures, multiple key custodians, and tamper-evident controls.Evidence guidance
Review key ceremony documentation including procedures, witness logs, custodian assignments, and tamper-evident bag records. Verify ceremonies are conducted in physically secured, customer-controlled environments.
-
KEYS-L4-C3Zero provider access to key material is architecturally enforced across the full lifecycle: generation, storage, use, rotation, and destruction.Evidence guidance
Review architecture documentation confirming key material never transits provider infrastructure in plaintext. Verify that cryptographic operations occur within customer-controlled boundaries (on-premises HSM, secure enclave, or confidential computing environment).
-
KEYS-L4-C4An independent key management system operates entirely within customer infrastructure, providing centralised governance over all cryptographic keys across hybrid and multi-cloud environments.Evidence guidance
Inspect the key management system deployment (e.g., HashiCorp Vault Enterprise on-premises, Thales CipherTrust Manager, Fortanix DSM). Confirm it operates on customer-owned infrastructure and manages keys across all environments without provider dependencies.
Data Residency DSCM-RES complete
L0 Unaware
-
RES-L0-C1Organisation has no documented data residency policy or requirements.Evidence guidance
Absence of any policy document, board resolution, or architectural guideline referencing data location.
-
RES-L0-C2No inventory exists mapping data assets to physical storage locations or provider regions.Evidence guidance
Confirm that no data-location register, CMDB entries, or cloud-account region reports have been produced.
-
RES-L0-C3Cloud services are deployed using provider defaults with no region selection applied.Evidence guidance
Review cloud console settings or infrastructure-as-code templates; default or auto-selected regions indicate this criterion is met.
L1 Dependent
-
RES-L1-C1Organisation has identified the primary regions where its cloud providers store data.Evidence guidance
Cloud console screenshots, provider documentation, or account settings showing region assignments.
-
RES-L1-C2No contractual data residency guarantees are in place; provider determines replication and failover regions.Evidence guidance
Review master service agreements and DPAs - confirm absence of region-restriction clauses.
-
RES-L1-C3Data location awareness exists at an organisational level but no technical or contractual controls enforce it.Evidence guidance
Internal communications, meeting minutes, or risk assessments acknowledging data location without mandating controls.
L2 Contractual
-
RES-L2-C1Data processing agreements (DPAs) with all critical providers specify approved data residency regions (EU/EEA or Switzerland).Evidence guidance
Executed DPAs with region-restriction clauses; legal review confirming coverage of all Tier-1 providers.
-
RES-L2-C2Standard Contractual Clauses (SCCs) with supplementary technical and organisational measures are in place for any provider subject to third-country jurisdiction.Evidence guidance
Signed SCC addenda (EU 2021/914 modules) with documented transfer impact assessments (TIAs).
-
RES-L2-C3A transfer impact assessment (TIA) has been conducted evaluating the legal framework of each provider's jurisdiction.Evidence guidance
Completed TIA documents referencing provider jurisdiction, government access laws, and supplementary measures adopted.
-
RES-L2-C4The organisation has documented residual risk for metadata, support tickets, and telemetry data processed outside contracted regions.Evidence guidance
Risk register entry or data flow diagram identifying metadata and ancillary data flows that fall outside DPA region restrictions.
L3 Controlled
-
RES-L3-C1Geo-fencing is configured at the infrastructure level to restrict data storage and processing to approved regions (EU/EEA or Switzerland).Evidence guidance
Cloud provider region-lock configurations, infrastructure-as-code templates with explicit region constraints, or sovereign cloud zone assignments.
-
RES-L3-C2Data replication and backup targets are explicitly restricted to approved regions with no automatic failover to non-approved jurisdictions.Evidence guidance
Replication policies, disaster recovery configurations, and backup target settings showing only approved regions.
-
RES-L3-C3Regular audits (at least annually) verify that data residency controls are functioning as intended and no data has left approved regions.Evidence guidance
Audit reports, compliance certificates, or third-party attestation reports confirming data residency enforcement.
L4 Autonomous
-
RES-L4-C1All data is stored and processed on infrastructure physically located in Switzerland or an approved EU/EEA jurisdiction.Evidence guidance
Data centre contracts and facility addresses confirming all infrastructure resides in approved jurisdictions.
-
RES-L4-C2All infrastructure is operated by an entity with no foreign-jurisdiction parent company.Evidence guidance
Corporate ownership documentation (commercial register extracts, shareholder disclosures) confirming no US or other foreign-jurisdiction parent entity.
-
RES-L4-C3No cross-border data transfers occur for any purpose, including support, telemetry, software updates, or disaster recovery.Evidence guidance
Network flow analysis, firewall rules, and egress monitoring confirming zero cross-border data flows. DNS, NTP, and update channels verified as domestic or EU-based.
-
RES-L4-C4Physical security of data centre facilities is under organisational control or subject to a domestic-only trust chain with independent audit rights.Evidence guidance
Physical access logs, facility security audit reports, and contractual audit-right clauses. For co-location: proof that facility operator is domestically owned.
-
RES-L4-C5Administrative access to all infrastructure is restricted to personnel within approved jurisdictions, with no remote access paths from foreign-jurisdiction entities.Evidence guidance
Access control policies, VPN and bastion host configurations, and HR records confirming all administrative personnel are based in approved jurisdictions.
Data Processing DSCM-PROC complete
L0 Unaware
-
PROC-L0-C1The organisation has no documented understanding of where its data is processed - neither geographic location nor infrastructure type (shared, dedicated, on-premises) is knownEvidence guidance
Request processing location documentation from the provider; review service agreements for any mention of data processing locations or infrastructure details
-
PROC-L0-C2No purpose limitation exists for data processing - the provider may use customer data for analytics, model training, product improvement, or other secondary purposes without explicit consentEvidence guidance
Review the provider's terms of service and privacy policy for clauses granting broad processing rights; check for opt-out mechanisms
-
PROC-L0-C3The organisation cannot identify which sub-processors or third parties have access to data during processingEvidence guidance
Ask the provider for a sub-processor list; review data flow diagrams if available; check whether sub-processor notifications are part of the contract
L1 Dependent
-
PROC-L1-C1The organisation knows which provider services process its data and has a general understanding of the geographic regions involved, but cannot enforce region restrictions technicallyEvidence guidance
Review provider dashboards and service documentation for region settings; confirm whether region selection is advisory or enforced; check for region-pinning capabilities
-
PROC-L1-C2Data is processed on shared, multi-tenant infrastructure without dedicated isolation guarantees - other tenants' workloads run on the same physical hardwareEvidence guidance
Review provider architecture documentation; check whether dedicated hosts, isolated VMs, or tenant separation mechanisms are available or in use
-
PROC-L1-C3The provider's standard terms of service govern processing, with no negotiated data processing agreement (DPA) or purpose limitation beyond the provider's default policiesEvidence guidance
Compare the active agreement against a formal DPA template; identify whether purpose limitation, data minimisation, or processing restrictions have been negotiated
L2 Contractual
-
PROC-L2-C1A GDPR-compliant DPA is in place with each processor, specifying processing purposes, data categories, retention periods, and the controller's instructionsEvidence guidance
Review executed DPAs for completeness against GDPR Art 28(3) requirements; verify that processing purposes are explicitly enumerated and not open-ended
-
PROC-L2-C2Sub-processor lists are maintained and reviewed; the organisation has contractual rights to object to new sub-processors and receives advance notification of changesEvidence guidance
Obtain current sub-processor lists from each provider; verify notification and objection mechanisms in the DPA; check whether sub-processor changes have been reviewed in the past 12 months
-
PROC-L2-C3The organisation's ability to verify where processing occurs depends entirely on provider attestation - no independent technical mechanism confirms jurisdictional complianceEvidence guidance
Review whether the organisation has any means beyond the provider's word to verify processing location; check for independent audit results, infrastructure transparency reports, or technical verification mechanisms
-
PROC-L2-C4Data minimisation principles are contractually acknowledged - the provider commits to processing only the minimum data necessary for the specified purposesEvidence guidance
Review DPA for data minimisation commitments; assess whether the provider's actual data collection aligns with minimisation principles through data flow analysis
L3 Controlled
-
PROC-L3-C1Data processing occurs within confidential computing environments (TEEs, secure enclaves, or equivalent) that prevent the provider from accessing data during computationEvidence guidance
Review deployment configurations for TEE/enclave usage (e.g., Intel SGX, AMD SEV, ARM TrustZone); verify attestation mechanisms are active; check provider documentation for confidential computing guarantees
-
PROC-L3-C2Processing is technically restricted to approved jurisdictions through infrastructure controls - not merely contractual commitmentsEvidence guidance
Review infrastructure-as-code for region-pinning configurations; verify that deployment policies block non-approved regions; test whether workloads can be launched in restricted regions
-
PROC-L3-C3Comprehensive audit logs capture all data access events during processing, including provider administrative access, and logs are stored in a location controlled by the organisationEvidence guidance
Review audit log configurations; verify that provider admin access is logged; confirm log storage is in an organisation-controlled location (separate account, SIEM, or on-premises)
L4 Autonomous
-
PROC-L4-C1All data processing occurs on infrastructure owned or exclusively leased by the organisation - no shared cloud provider resources are involved in processing sensitive dataEvidence guidance
Review infrastructure inventory and hosting contracts; verify that processing hardware is exclusively allocated; confirm no fallback to shared cloud infrastructure exists
-
PROC-L4-C2Zero provider access during processing is enforced - no external vendor, cloud provider, or third-party support personnel can access the processing environment without the organisation's explicit, audited authorisationEvidence guidance
Review access control policies and network architecture; verify that remote access by vendors is disabled by default; audit access logs for any third-party access events
-
PROC-L4-C3Air-gapped processing environments are available for the most sensitive workloads, with physical network isolation preventing any data exfiltration during computationEvidence guidance
Inspect network architecture for air-gapped segments; verify physical isolation (no network interfaces, disabled wireless, controlled USB ports); review data transfer procedures for air-gapped environments
-
PROC-L4-C4The organisation controls the full processing stack - hardware procurement, firmware, operating systems, runtime environments, and application code - with supply-chain verification at each layerEvidence guidance
Review hardware procurement procedures for supply-chain integrity; verify firmware signing and validation; audit OS and runtime build pipelines for reproducibility and integrity checks
Legal & Contractual DSCM-LEGAL complete
L0 Unaware
-
LEGAL-L0-C1Cloud and SaaS services are adopted by accepting click-through Terms of Service without any legal review or risk assessmentEvidence guidance
Request documentation of legal review for the five most critical cloud services. Absence of any review records satisfies this criterion.
-
LEGAL-L0-C2No Data Processing Agreement (DPA) has been executed with any cloud provider processing personal dataEvidence guidance
Request the register of DPAs or equivalent processor agreements. Complete absence or inability to produce any signed DPA satisfies this criterion.
-
LEGAL-L0-C3The organisation cannot identify which jurisdictions govern its cloud service agreements or where disputes would be adjudicatedEvidence guidance
Interview IT and procurement leadership regarding governing law and dispute resolution clauses in active contracts. Inability to answer confirms this criterion.
L1 Dependent
-
LEGAL-L1-C1Data Processing Agreements have been signed with major cloud providers, but exclusively using the provider's standard template without modificationEvidence guidance
Collect signed DPAs and compare them against the provider's publicly available standard DPA. Identical or near-identical text confirms this criterion.
-
LEGAL-L1-C2Service agreements contain foreign (typically US) governing law and jurisdiction clauses that have been accepted without legal assessment of their implicationsEvidence guidance
Review the governing law and dispute resolution clauses in the top five cloud contracts. Acceptance of non-local jurisdiction without documented risk assessment confirms this criterion.
-
LEGAL-L1-C3The provider retains the unilateral right to modify terms, sub-processors, or service scope with no more than email notification to the customerEvidence guidance
Review the change-of-terms and sub-processor notification clauses in active agreements. Unilateral provider rights with notification-only obligations confirm this criterion.
L2 Contractual
-
LEGAL-L2-C1Data Processing Agreements have been negotiated with material amendments - including enhanced audit rights, incident notification timelines, and sub-processor approval mechanisms - beyond the provider's standard templateEvidence guidance
Compare executed DPAs against the provider's standard template. Identify negotiated amendments documented in addenda, side letters, or redlined versions. At least three material amendments must be evidenced.
-
LEGAL-L2-C2Standard Contractual Clauses (SCCs) or equivalent transfer mechanisms are in place for all international data transfers, with Transfer Impact Assessments completedEvidence guidance
Request executed SCCs (EU Commission Module 2 or Module 3 as applicable) and associated Transfer Impact Assessments (TIAs) for each cross-border transfer. Both must exist for each transfer to satisfy this criterion.
-
LEGAL-L2-C3Sub-processor lists are actively monitored, with changes tracked and recorded as they are notified by providersEvidence guidance
Request the sub-processor monitoring log showing receipt dates, change descriptions, and tracking entries for all provider notifications within the past 12 months.
-
LEGAL-L2-C4A documented process exists for reviewing new sub-processors and exercising objection rights when sub-processor changes present unacceptable riskEvidence guidance
Request the sub-processor review procedure, evidence of review assessments when new sub-processors were notified, and any objection correspondence sent to providers.
-
LEGAL-L2-C5Legal counsel with data protection expertise has reviewed all cloud service agreements governing critical systemsEvidence guidance
Request legal review memoranda, risk assessments, or counsel opinion letters for the top five cloud service agreements. Substantive analysis - not mere checkbox review - must be evidenced.
L3 Controlled
-
LEGAL-L3-C1Custom enterprise agreements - not provider standard ToS with amendments - govern all critical cloud service relationships, with EU or Swiss governing law and local jurisdiction for dispute resolutionEvidence guidance
Review the master service agreement for each critical cloud service. The agreement must be a bespoke or enterprise-negotiated contract (not amended standard ToS) with an EU or Swiss governing law clause and a local dispute resolution forum.
-
LEGAL-L3-C2Bilateral termination rights are contractually established, including the customer's right to terminate for material breach, change of control, or regulatory necessityEvidence guidance
Review termination clauses in enterprise agreements. Customer termination rights must exist beyond simple convenience termination, covering at least material breach, change of control, and regulatory necessity scenarios.
-
LEGAL-L3-C3Data portability and extraction obligations are explicitly defined in all critical cloud service contracts, specifying format, timeline, and provider assistance requirements upon terminationEvidence guidance
Review exit and termination clauses for data portability provisions. Contracts must specify the data format (e.g., open standards), extraction timeline (e.g., 90 days), and provider obligations to assist with migration.
-
LEGAL-L3-C4Source code, configuration, or data escrow arrangements are in place for critical service dependencies, with defined release conditions including provider insolvency, material breach, or service discontinuationEvidence guidance
Request executed escrow agreements with a reputable escrow agent. Review release conditions and verify that escrow deposits are current (updated within the last 12 months).
-
LEGAL-L3-C5CLOUD Act and foreign government data access risks are mitigated through a combination of contractual commitments and structural measures - such as EU-only data residency with EU-based operating entities, legal challenge undertakings, and data access architecture that limits provider access to cleartextEvidence guidance
Review the CLOUD Act mitigation strategy. Evidence must include both contractual provisions (challenge commitments, notification obligations, EU entity operations) and technical or structural measures (encryption architecture, access controls, EU data boundary programmes).
L4 Autonomous
-
LEGAL-L4-C1All critical infrastructure and services are either self-hosted or operated by sovereign cloud providers incorporated and operating exclusively within the local jurisdiction, with no foreign parent entity, subsidiary relationship, or contractual obligation that could create foreign law exposureEvidence guidance
Review the corporate structure and ownership chain of all infrastructure and service providers. Verify through commercial register extracts that no foreign entity has ownership, control, or contractual rights that could trigger foreign government access obligations. Self-hosted infrastructure satisfies this criterion directly.
-
LEGAL-L4-C2The software stack for critical services is composed of open-source components under permissive or copyleft licences, eliminating proprietary vendor lock-in and ensuring the organisation can fork, modify, or replace any component without contractual constraintEvidence guidance
Request a software bill of materials (SBOM) for critical services. Verify that all components are available under recognised open-source licences (e.g., MIT, Apache 2.0, GPL, AGPL). No proprietary components should exist in the critical path.
-
LEGAL-L4-C3All data processing agreements, service contracts, and infrastructure arrangements are governed exclusively by local law (EU member state or Swiss law) with no clause, mechanism, or corporate relationship that could subject data to foreign jurisdictionEvidence guidance
Conduct a comprehensive legal review of all contracts, corporate structures, and service arrangements. A legal opinion from qualified counsel confirming zero foreign law exposure must be available.
Logging & Audit DSCM-AUDIT complete
L0 Unaware
-
AUDIT-L0-C1The organisation has no awareness of which external parties generate, store, or have access to its operational logs.Evidence guidance
Ask the organisation to identify where its logs are stored and who can access them. Inability to answer satisfies this criterion.
-
AUDIT-L0-C2Logs exist only as provider defaults (e.g., basic cloud console activity logs) and are neither actively monitored nor forwarded to any centralised system.Evidence guidance
Review cloud provider logging configurations and ask operations staff whether any log aggregation or review process exists.
L1 Dependent
-
AUDIT-L1-C1The organisation uses provider-native logging services as its primary logging infrastructure, with log storage residing entirely within the provider's platform.Evidence guidance
Verify that logging services such as AWS CloudWatch, Azure Monitor, or GCP Cloud Logging are enabled. Confirm that no external log aggregation or SIEM is in use.
-
AUDIT-L1-C2Log format, schema, and retention periods are determined by the provider's defaults or are only configurable within provider-defined constraints.Evidence guidance
Review log retention configurations in the provider console. Check whether custom log schemas or formats have been defined. Provider-default settings with no organisational override satisfy this criterion.
-
AUDIT-L1-C3Log data cannot be exported in a timely or automated manner to an independent storage system outside the provider's platform.Evidence guidance
Attempt to export a representative log dataset. Check whether automated export pipelines (e.g., to S3, Azure Blob, or an external SIEM) are configured. Absence of automated export satisfies this criterion.
L2 Contractual
-
AUDIT-L2-C1The Data Processing Agreement (DPA) or service contract specifies minimum log retention periods, log categories to be captured, and the organisation's right to export log data.Evidence guidance
Review the DPA and service agreements for explicit clauses on log retention, log types, and export rights. Generic clauses without specific retention periods do not satisfy this criterion.
-
AUDIT-L2-C2Automated log export pipelines are operational, forwarding provider-generated logs to an organisation-controlled storage system on a near-real-time or daily basis.Evidence guidance
Verify the existence of automated log export configurations (e.g., CloudWatch Subscription Filters, Azure Event Hub export, Pub/Sub to external storage). Check that exports are current and not stale.
-
AUDIT-L2-C3A formal log retention policy defines retention periods per log category, aligned with regulatory requirements (GDPR, NIS2, DORA).Evidence guidance
Request the log retention policy document. Confirm that retention periods meet regulatory minimums (e.g., 1 year for NIS2, up to 5 years for DORA).
-
AUDIT-L2-C4The provider retains access to log data and metadata, and the organisation has not established independent log integrity verification.Evidence guidance
Confirm that log data passes through provider infrastructure before reaching the organisation's storage. Verify that no log integrity mechanisms (e.g., hash chains, write-once storage) are in place on the organisation's copy.
L3 Controlled
-
AUDIT-L3-C1A self-managed SIEM platform is operational, serving as the primary log analysis and alerting system.Evidence guidance
Verify the SIEM deployment (e.g., Wazuh, ELK, OpenSearch, Graylog). Confirm it is the primary platform used for log analysis and security alerting, not a secondary or unused installation.
-
AUDIT-L3-C2All log storage resides within a sovereign jurisdiction, with documented data residency controls ensuring logs do not leave the designated jurisdiction.Evidence guidance
Verify the physical location of SIEM storage infrastructure. Review data residency configurations and confirm that log replication or backup does not cross jurisdictional boundaries.
L4 Autonomous
-
AUDIT-L4-C1All logging infrastructure - collection, processing, storage, and analysis - runs on organisation-owned or organisation-controlled hardware with no dependency on cloud provider IaaS for the logging pipeline itself.Evidence guidance
Verify that the SIEM, log storage, and analysis platforms run on infrastructure owned or directly leased by the organisation (co-location or on-premises). Confirm that no component of the logging pipeline depends on a cloud provider's compute, storage, or networking services.
-
AUDIT-L4-C2Audit trails are cryptographically signed using organisation-controlled keys with independent timestamping from a trusted third-party timestamping authority (TSA), producing legally defensible, non-repudiable audit records.Evidence guidance
Review the cryptographic signing mechanism for log entries. Verify that signing keys are held in an HSM or equivalent secure key store under organisational control. Confirm that timestamps are obtained from a qualified TSA (e.g., RFC 3161 compliant) independent of the cloud provider.
-
AUDIT-L4-C3An air-gapped log archive exists for critical audit records, physically isolated from all networked systems, with documented procedures for secure write and read operations.Evidence guidance
Inspect the air-gapped archive facility. Verify physical isolation (no network connectivity). Review the procedures for transferring log data to the archive and for retrieving records during investigations. Confirm that archive integrity is periodically verified.
-
AUDIT-L4-C4The organisation generates its own telemetry independently of provider logging, ensuring forensic capability even if provider logs are unavailable or compromised.Evidence guidance
Verify that the organisation operates independent telemetry collection (e.g., osquery, Beats, Fluentd, custom agents) that provides forensic coverage without relying on provider-generated log data as the sole source.
Network Infrastructure DSCM-NET complete
L0 Unaware
-
NET-L0-C1The organisation has no inventory of its DNS providers, CDN services, or network dependenciesEvidence guidance
Request documentation of DNS registrars, nameserver providers, CDN services, and ISP contracts; verify whether a network dependency register exists in any form (spreadsheet, CMDB, wiki)
-
NET-L0-C2The organisation has no understanding of which external parties can modify its network configuration - routing, DNS, or firewall changes could be made by providers without the organisation's awarenessEvidence guidance
Ask who can make changes to DNS records, firewall rules, or routing configuration; determine whether the organisation would know if a provider made unilateral changes to its network setup
-
NET-L0-C3DNS domain registrations and critical network accounts are tied to individual employee credentials rather than organisational accounts with role-based accessEvidence guidance
Audit DNS registrar account ownership, CDN console access, and ISP portal credentials; check whether accounts are registered under personal email addresses or shared credentials
L1 Dependent
-
NET-L1-C1All DNS, CDN, and network routing are managed by a single provider with no alternative or failover configurationEvidence guidance
Identify the DNS registrar and nameserver provider; confirm whether a secondary DNS provider or alternative CDN exists. Check for any documented failover or disaster recovery plan for network services.
-
NET-L1-C2The organisation cannot modify DNS records, firewall rules, or routing policies without going through the provider's support processEvidence guidance
Attempt to identify how DNS changes are made; verify whether the organisation has API or console access, or whether all changes require a support ticket with the provider
-
NET-L1-C3Network monitoring relies entirely on the provider's built-in dashboards with no independent verification of availability or performanceEvidence guidance
Review monitoring tools in use; confirm whether any external or self-hosted monitoring (e.g., uptime checks, synthetic tests) exists independently of the primary network provider
L2 Contractual
-
NET-L2-C1The organisation has contractual authority to manage its own DNS records and CDN caching policies through provider-supplied tooling, including API access for programmatic managementEvidence guidance
Confirm API or console access to DNS and CDN management; verify that the contract grants the organisation self-service capability for record changes, cache purges, and configuration updates without requiring provider intervention
-
NET-L2-C2Data Processing Agreements are in place with all network providers that specify the jurisdictional scope of network metadata processing, including DNS query logs, CDN access logs, and traffic analyticsEvidence guidance
Review signed DPAs for DNS, CDN, and ISP providers; confirm that they address the processing of network metadata (IP addresses, query logs, access logs) and specify geographic restrictions on where this data is processed and stored
-
NET-L2-C3Network access logs, DNS query logs, and firewall logs are exported to an organisation-controlled log management systemEvidence guidance
Verify that CDN access logs, DNS query logs, and firewall logs are forwarded to an organisation-controlled SIEM or log management platform rather than retained solely in the provider's console
-
NET-L2-C4Log retention periods for all network metadata meet applicable regulatory requirementsEvidence guidance
Confirm that retention policies for network logs exceed the provider's default and satisfy applicable regulatory requirements (typically 12+ months); verify that retention is enforced through automated lifecycle policies
L3 Controlled
-
NET-L3-C1DNS is managed through organisation-controlled authoritative nameservers with automated failover to a secondary DNS providerEvidence guidance
Inspect the authoritative DNS infrastructure; confirm that the organisation operates its own nameservers (e.g., PowerDNS, Knot DNS, BIND) or controls the configuration of a dedicated DNS provider. Verify automated failover through DNS health checks and secondary provider configuration.
-
NET-L3-C2DNSSEC is deployed and validated on all organisational domainsEvidence guidance
Confirm DNSSEC signing is active on all authoritative zones; verify that DNSSEC validation succeeds using external validation tools (e.g., DNSViz, Verisign DNSSEC Debugger). Check that DS records are published in parent zones.
-
NET-L3-C3CDN and DDoS mitigation services are provided by European-headquartered providers or self-managed edge infrastructure, eliminating US-jurisdictional exposure for content deliveryEvidence guidance
Identify all CDN and DDoS mitigation providers; confirm their legal incorporation jurisdiction. If self-managed, verify the geographic distribution and capacity of edge nodes. Acceptable European providers include those headquartered and incorporated in EU/EEA or Swiss jurisdictions.
L4 Autonomous
-
NET-L4-C1The organisation holds its own AS number and provider-independent IP address allocations through RIPE NCC, with RPKI Route Origin Authorisations published for all announced prefixesEvidence guidance
Verify the organisation's ASN and IP allocations in the RIPE database. Check that RPKI Route Origin Authorisations (ROAs) are published for all announced prefixes. Verify the organisation appears in public BGP routing tables under its own ASN.
-
NET-L4-C2BGP peering is established at multiple European internet exchange pointsEvidence guidance
Confirm BGP peering sessions at two or more European IXPs (e.g., DE-CIX, SwissIX, AMS-IX). Verify active session status and review peering agreements. Check that the organisation maintains both public peering (route servers) and private peering with critical partners.
-
NET-L4-C3All DNS infrastructure, both authoritative nameservers and recursive resolvers, is operated on organisation-controlled hardware within a known legal jurisdiction, with DNSSEC fully deployed and validatedEvidence guidance
Audit the complete DNS stack; confirm that authoritative nameservers and recursive resolvers run on organisation-owned or exclusively leased infrastructure. Verify DNSSEC signing (authoritative) and validation (recursive). Confirm that no external recursive resolver (e.g., Google 8.8.8.8, Cloudflare 1.1.1.1) is used as a fallback for organisational systems.
-
NET-L4-C4DDoS mitigation is operated on organisation-controlled infrastructure using BGP-based techniques (RTBH, flowspec) or organisation-managed scrubbing capacity, with no dependency on a single external mitigation providerEvidence guidance
Review DDoS mitigation architecture; confirm the organisation can implement BGP Remotely Triggered Black Hole (RTBH) routing and/or BGP flowspec rules at its IXP peers. If scrubbing centres are used, verify they are European-operated and that the organisation maintains independent mitigation capability.
-
NET-L4-C5The organisation maintains internal network connectivity and critical service availability during a complete loss of external internet connectivityEvidence guidance
Request documentation of network isolation testing; confirm that internal DNS resolution, authentication, and critical application access function when external connectivity is severed. Verify that an isolation test has been conducted within the past 12 months.
Compute & Runtime DSCM-COMP draft
L0 Unaware
-
COMP-L0-C1The organisation has no inventory of its compute environments, runtime platforms, or execution dependencies -
COMP-L0-C2Workloads run on unknown or uncontrolled infrastructure with no visibility into resource allocation or geographic placement
L1 Dependent
-
COMP-L1-C1All production workloads execute on a single cloud provider's managed services (e.g., AWS Lambda, Azure App Service, Google Cloud Run) with provider-specific runtime dependencies -
COMP-L1-C2The organisation cannot migrate workloads to an alternative provider without significant re-engineering
L2 Contractual
-
COMP-L2-C1Contracts with compute providers include explicit terms for geographic region selection, guaranteed resource allocation, and data processing boundaries -
COMP-L2-C2The organisation has documented which workloads use provider-specific features and has a preliminary abstraction strategy
L3 Controlled
-
COMP-L3-C1All production workloads run as OCI-standard containers orchestrated by the organisation through Kubernetes or equivalent platform -
COMP-L3-C2Workload migration to an alternative compute provider has been tested and can be executed within a defined recovery time objective
L4 Autonomous
-
COMP-L4-C1Critical workloads run on organisation-owned or dedicated co-located hardware with no shared tenancy -
COMP-L4-C2Confidential computing or trusted execution environments are deployed for sensitive workloads, ensuring code and data remain encrypted during processing
Supply Chain DSCM-SUPPLY draft
L0 Unaware
-
SUPPLY-L0-C1The organisation has no Software Bill of Materials (SBOM) and cannot enumerate its third-party dependencies -
SUPPLY-L0-C2Dependencies are pulled directly from public registries at build time with no pinning, verification, or caching
L1 Dependent
-
SUPPLY-L1-C1Dependencies are tracked through a provider-managed tool (e.g., GitHub Dependabot, Snyk) but the organisation has no independent SBOM generation -
SUPPLY-L1-C2Vulnerability alerts are received from the provider but there is no defined SLA for remediation or escalation
L2 Contractual
-
SUPPLY-L2-C1Contracts with software vendors require SBOM delivery in a standard format (SPDX or CycloneDX) and timely disclosure of known vulnerabilities -
SUPPLY-L2-C2Internal policy defines approved dependency sources, licence compatibility requirements, and vulnerability remediation SLAs
L3 Controlled
-
SUPPLY-L3-C1All builds produce machine-readable SBOMs automatically, and a private package registry serves as the sole source for all production dependencies -
SUPPLY-L3-C2Dependency signatures and provenance attestations (e.g., SLSA, Sigstore) are verified before any package enters the private registry
L4 Autonomous
-
SUPPLY-L4-C1Critical dependencies are audited at the source-code level, and the organisation maintains forks or mirrors of essential open-source components -
SUPPLY-L4-C2End-to-end supply chain provenance is cryptographically verifiable from source code to production deployment, meeting SLSA Level 3 or higher
Exit Strategy DSCM-EXIT draft
L0 Unaware
-
EXIT-L0-C1The organisation has no documented exit plan for any of its critical service providers -
EXIT-L0-C2No assessment has been performed to identify vendor lock-in risks or migration barriers
L1 Dependent
-
EXIT-L1-C1The organisation can export its data from critical providers but only through manual processes or provider-specific tooling -
EXIT-L1-C2No timeline, cost estimate, or resource plan exists for migrating away from any critical provider
L2 Contractual
-
EXIT-L2-C1Contracts with critical providers include portability clauses requiring data export in open, documented formats within defined timeframes -
EXIT-L2-C2Transition assistance periods are contractually guaranteed, providing support during migration to an alternative provider
L3 Controlled
-
EXIT-L3-C1Detailed migration runbooks exist for all critical provider dependencies, and at least one full migration drill has been completed successfully -
EXIT-L3-C2Alternative provider environments are pre-configured and validated, ready to receive migrated workloads and data within defined recovery time objectives
L4 Autonomous
-
EXIT-L4-C1All systems are architected for provider-agnostic operation using open standards, portable formats, and abstraction layers that eliminate provider-specific dependencies -
EXIT-L4-C2Provider switching can be executed as a routine operational procedure with near-zero downtime and no data loss
Incident Response DSCM-IR draft
L0 Unaware
-
IR-L0-C1The organisation has no documented incident response plan, and no individual or team is responsible for security incident management -
IR-L0-C2No security monitoring or alerting is in place; incidents are typically discovered by end users or external parties
L1 Dependent
-
IR-L1-C1Security monitoring and incident detection are handled exclusively by the cloud or managed service provider with no independent organisational capability -
IR-L1-C2Incident response is reactive, triggered by provider notifications, with no organisational playbooks for containment or recovery
L2 Contractual
-
IR-L2-C1Contracts with service providers include incident notification SLAs, forensic data access rights, and defined escalation procedures -
IR-L2-C2The organisation maintains basic incident response playbooks covering the most likely threat scenarios, with designated internal contacts
L3 Controlled
-
IR-L3-C1The organisation operates an internal SOC or equivalent security operations function with independent monitoring, detection, and investigation capabilities -
IR-L3-C2Incident response procedures are regularly tested through tabletop exercises and simulated attacks, with findings incorporated into updated playbooks
L4 Autonomous
-
IR-L4-C1The organisation conducts proactive threat hunting using proprietary detection rules, integrated threat intelligence, and advanced analytics across all environments -
IR-L4-C2Automated incident response orchestration (SOAR) handles common incident types end-to-end, from detection through containment to recovery, with minimal human intervention
Governance & Compliance DSCM-GOV draft
L0 Unaware
-
GOV-L0-C1The organisation has no governance framework, policy, or designated role addressing digital sovereignty or technology risk -
GOV-L0-C2Compliance with data protection and security regulations is handled reactively, with no proactive monitoring or assessment
L1 Dependent
-
GOV-L1-C1The organisation relies on provider certifications (e.g., ISO 27001, SOC 2) as its primary evidence of compliance, with no independent assessment -
GOV-L1-C2No internal governance body or process evaluates technology decisions through a sovereignty lens
L2 Contractual
-
GOV-L2-C1The organisation maintains a formal compliance programme with documented policies covering data protection, security, and sovereignty requirements -
GOV-L2-C2Provider contracts include compliance obligations, audit rights, and regular reporting requirements aligned with the organisation's governance framework
L3 Controlled
-
GOV-L3-C1A cross-functional sovereignty governance board with executive sponsorship reviews all significant technology decisions for sovereignty implications -
GOV-L3-C2Continuous compliance monitoring is in place across all sovereignty dimensions, with automated controls validation and real-time dashboards
L4 Autonomous
-
GOV-L4-C1The organisation actively contributes to industry standards, regulatory frameworks, and best practices for digital sovereignty governance -
GOV-L4-C2Sovereignty governance is transparent, with public reporting on the organisation's sovereignty posture and continuous improvement commitments