Assessment criteria

172 criteria across 12 dimensions and 5 maturity levels. Each criterion defines a single testable condition for assessing your organisation's sovereignty posture.

Loading criteria...

Identity & Access DSCM-IAM complete

L0 Unaware

  • IAM-L0-C1 The organisation has no centralised identity directory. User accounts are created ad-hoc per system with no single source of truth
    Evidence guidance

    Review onboarding documentation and system admin interfaces; check whether a directory service (LDAP, AD, cloud IdP) exists

  • IAM-L0-C2 Shared or generic accounts (e.g., admin@, info@, root) are used for day-to-day operations, including access to production systems
    Evidence guidance

    Audit login records and account inventories across critical systems; look for accounts used by more than one natural person

L1 Dependent

  • IAM-L1-C1 All user identities are stored and managed in a single cloud-provider IAM service (e.g., Microsoft Entra ID, Google Workspace, AWS IAM Identity Center) with no on-premises or self-hosted fallback
    Evidence guidance

    Confirm that the identity provider is a SaaS-only service; verify there is no secondary IdP or directory synchronisation to an on-prem store

  • IAM-L1-C2 All authentication methods, including multi-factor authentication, are provided and controlled by the cloud identity provider with no organisation-managed alternative
    Evidence guidance

    Verify that MFA methods (push notifications, TOTP seeds, SMS) are entirely managed within the provider's console; confirm the organisation does not operate any independent authentication factor (e.g., own FIDO2 key management, own TOTP issuer)

  • IAM-L1-C3 The organisation has no control over where identity data is stored or processed. Region selection is either unavailable or left at provider defaults
    Evidence guidance

    Check the IdP's data-residency settings; review the provider's sub-processor list for identity-related data flows

  • IAM-L1-C4 The organisation has no independent record of who has access to what. Access inventories exist only within the provider's platform and cannot be exported or verified externally
    Evidence guidance

    Ask whether the organisation maintains any access inventory outside the provider's console; determine if access data can be exported in a machine-readable format for independent analysis

L2 Contractual

  • IAM-L2-C1 A Data Processing Agreement (DPA) is in place with the identity provider that specifies data-residency requirements, sub-processor restrictions, and audit rights
    Evidence guidance

    Obtain the signed DPA; verify it includes jurisdiction-specific data-residency commitments (e.g., EU-only processing), a sub-processor notification mechanism, and the right to conduct or commission audits

  • IAM-L2-C2 SAML 2.0 or OpenID Connect (OIDC) federation is configured between the cloud IdP and all business-critical applications, using organisation-owned domain names and metadata endpoints
    Evidence guidance

    Review federation configurations; confirm the organisation controls the SAML/OIDC metadata URLs and signing certificates, and that relying parties are registered under organisation-owned domains

  • IAM-L2-C3 Regular access reviews are conducted using provider tooling, with results exported to an independent system for retention and audit trail purposes
    Evidence guidance

    Request evidence of the last two access review cycles; confirm that review results are archived outside the provider's platform (e.g., in an internal GRC tool or document management system)

L3 Controlled

  • IAM-L3-C1 A self-managed identity provider (e.g., Keycloak, Authentik) serves as the authoritative identity source; cloud IdPs consume identities via federation rather than owning them
    Evidence guidance

    Inspect the identity architecture diagram; confirm the self-managed IdP is the master directory and that cloud IdPs (e.g., Entra ID, Google Workspace) are configured as federation targets or downstream consumers via SAML/OIDC

  • IAM-L3-C2 Authentication factors for privileged accounts are managed by organisation-controlled infrastructure, not delegated to a third-party provider (e.g., organisation-managed FIDO2 keys or smartcard PKI rather than provider-managed push notifications)
    Evidence guidance

    Confirm that the MFA enrolment, seed generation, and verification for privileged accounts are handled by the self-managed IdP or organisation-owned hardware, not by an external provider's authentication service

  • IAM-L3-C3 The organisation can perform a full identity-provider failover or migration without losing user accounts, group memberships, or access policies
    Evidence guidance

    Request documentation of the DR/migration plan; verify that identity data is regularly exported in a portable format (SCIM, LDIF, or equivalent) and that a failover test has been conducted within the past 12 months

L4 Autonomous

  • IAM-L4-C1 All identity infrastructure - directory services, authentication engines, token issuance, and policy decision points - is self-hosted on organisation-controlled infrastructure within a known legal jurisdiction
    Evidence guidance

    Audit the complete identity stack; confirm that no component relies on an external SaaS provider for runtime operation. Verify hosting location through infrastructure documentation and physical or virtual audit.

  • IAM-L4-C2 The organisation can authenticate all users and enforce all access policies with zero dependency on external services, including DNS resolution, certificate authorities, or cloud-based MFA providers
    Evidence guidance

    Conduct an isolation test: simulate complete external connectivity loss and verify that internal authentication and authorisation continue to function. Review the dependency map for any external call-outs during authentication flows.

  • IAM-L4-C3 Cryptographic material for identity operations (signing keys, TLS certificates, FIDO2 attestation roots) is generated, stored, and rotated using organisation-controlled HSMs or equivalent tamper-resistant hardware
    Evidence guidance

    Inspect HSM deployment and key-management procedures; confirm that identity-critical keys are generated on-premises, never exported in plaintext, and rotated on a documented schedule

  • IAM-L4-C4 The organisation has decentralised identity capabilities (W3C Verifiable Credentials, DID methods) deployed or has a documented, tested implementation plan for inter-organisational trust without relying on a centralised identity broker
    Evidence guidance

    Review whether DID/VC infrastructure is deployed or a documented implementation plan exists; confirm that the organisation can issue and verify credentials without depending on a third-party identity federation service

Cryptographic Keys DSCM-KEYS complete

L0 Unaware

  • KEYS-L0-C1 No formal encryption policy or standard has been defined for data at rest or in transit.
    Evidence guidance

    Request the organisation's encryption policy or information security policy. Absence of any documented encryption requirements satisfies this criterion.

  • KEYS-L0-C2 Encryption keys are entirely provider-managed with no organisational awareness of key custody arrangements.
    Evidence guidance

    Interview IT leadership regarding who holds encryption keys and where key material resides. Lack of knowledge or 'the cloud provider handles it' responses confirm this criterion.

  • KEYS-L0-C3 No key rotation schedule or key lifecycle management process is in place.
    Evidence guidance

    Request documentation of key rotation policies or automated rotation configurations. Complete absence satisfies this criterion.

L1 Dependent

  • KEYS-L1-C1 A basic encryption policy exists that mandates encryption at rest and in transit for production systems.
    Evidence guidance

    Review the organisation's encryption policy or relevant section of the information security policy. Confirm it requires encryption for data at rest and in transit.

  • KEYS-L1-C2 Provider-managed encryption services are explicitly identified and documented (e.g., AWS SSE-S3, Azure SSE with Microsoft-managed keys, Google default encryption).
    Evidence guidance

    Request an inventory of encryption services in use. Verify that specific provider encryption mechanisms are named and mapped to workloads.

  • KEYS-L1-C3 The organisation acknowledges that key material is held by the provider and has documented this as a known dependency.
    Evidence guidance

    Review risk registers or dependency documentation for explicit acknowledgement that the cloud provider controls key material.

L2 Contractual

  • KEYS-L2-C1 The Data Processing Agreement explicitly addresses key management responsibilities, key custody, and conditions under which the provider may access key material.
    Evidence guidance

    Review the DPA for clauses covering encryption key management, key access conditions, and key custody responsibilities. Confirm these are specific rather than generic security references.

  • KEYS-L2-C2 BYOK or customer-managed key options have been contractually secured with the provider, even if not yet fully implemented.
    Evidence guidance

    Review service agreements or order forms for BYOK/CMK entitlements. Confirm the organisation has the contractual right to manage its own keys.

  • KEYS-L2-C3 A key management procedure documents key lifecycle stages including generation, distribution, rotation, revocation, and destruction.
    Evidence guidance

    Request the key management procedure. Verify it covers the full key lifecycle and assigns responsibilities for each stage.

  • KEYS-L2-C4 The provider's technical access to key material has been assessed and documented as a residual risk.
    Evidence guidance

    Review risk assessments or technical architecture documentation acknowledging that BYOK in cloud KMS does not fully eliminate provider access to key material in memory during cryptographic operations.

L3 Controlled

  • KEYS-L3-C1 Customer-managed keys (BYOK or HYOK) are implemented for all critical workloads, with key material stored in HSM-backed infrastructure that prevents provider access to plaintext keys.
    Evidence guidance

    Review key management architecture documentation. Verify HSM-backed key storage (e.g., AWS CloudHSM, Azure Dedicated HSM, or third-party HSM) is used rather than standard cloud KMS. Confirm the provider cannot extract plaintext key material.

  • KEYS-L3-C2 Encryption key material resides exclusively within EU or Swiss jurisdiction, with no replication to non-EU/non-Swiss locations.
    Evidence guidance

    Request HSM deployment location documentation. Verify that HSM instances and key material are deployed in EU/Swiss data centre regions with no cross-border replication.

  • KEYS-L3-C3 Key rotation is automated under customer control, not delegated to the provider.
    Evidence guidance

    Review automated key rotation configurations. Confirm that rotation is triggered by customer-managed automation, not by the provider's default rotation mechanisms.

  • KEYS-L3-C4 Key rotation schedules are defined per data classification level.
    Evidence guidance

    Review key rotation schedules and confirm rotation frequency varies according to data classification policy (e.g., more frequent rotation for higher-sensitivity data).

  • KEYS-L3-C5 Envelope encryption is implemented, separating data encryption keys (DEKs) from key encryption keys (KEKs) with the KEK under customer-controlled HSM protection.
    Evidence guidance

    Review encryption architecture documentation for envelope encryption design. Verify KEKs are stored in customer-controlled HSMs and DEKs are wrapped/unwrapped using customer-controlled operations.

L4 Autonomous

  • KEYS-L4-C1 Self-hosted HSM infrastructure is deployed on-premises or in a customer-controlled data centre, with no dependency on cloud provider HSM services.
    Evidence guidance

    Inspect on-premises HSM deployment (e.g., Thales Luna, Utimaco SecurityServer, Entrust nShield). Verify HSMs are physically located in customer-controlled facilities with no cloud provider involvement in HSM operations.

  • KEYS-L4-C2 Key ceremonies for root key generation are conducted on-premises with documented procedures, multiple key custodians, and tamper-evident controls.
    Evidence guidance

    Review key ceremony documentation including procedures, witness logs, custodian assignments, and tamper-evident bag records. Verify ceremonies are conducted in physically secured, customer-controlled environments.

  • KEYS-L4-C3 Zero provider access to key material is architecturally enforced across the full lifecycle: generation, storage, use, rotation, and destruction.
    Evidence guidance

    Review architecture documentation confirming key material never transits provider infrastructure in plaintext. Verify that cryptographic operations occur within customer-controlled boundaries (on-premises HSM, secure enclave, or confidential computing environment).

  • KEYS-L4-C4 An independent key management system operates entirely within customer infrastructure, providing centralised governance over all cryptographic keys across hybrid and multi-cloud environments.
    Evidence guidance

    Inspect the key management system deployment (e.g., HashiCorp Vault Enterprise on-premises, Thales CipherTrust Manager, Fortanix DSM). Confirm it operates on customer-owned infrastructure and manages keys across all environments without provider dependencies.

Data Residency DSCM-RES complete

L0 Unaware

  • RES-L0-C1 Organisation has no documented data residency policy or requirements.
    Evidence guidance

    Absence of any policy document, board resolution, or architectural guideline referencing data location.

  • RES-L0-C2 No inventory exists mapping data assets to physical storage locations or provider regions.
    Evidence guidance

    Confirm that no data-location register, CMDB entries, or cloud-account region reports have been produced.

  • RES-L0-C3 Cloud services are deployed using provider defaults with no region selection applied.
    Evidence guidance

    Review cloud console settings or infrastructure-as-code templates; default or auto-selected regions indicate this criterion is met.

L1 Dependent

  • RES-L1-C1 Organisation has identified the primary regions where its cloud providers store data.
    Evidence guidance

    Cloud console screenshots, provider documentation, or account settings showing region assignments.

  • RES-L1-C2 No contractual data residency guarantees are in place; provider determines replication and failover regions.
    Evidence guidance

    Review master service agreements and DPAs - confirm absence of region-restriction clauses.

  • RES-L1-C3 Data location awareness exists at an organisational level but no technical or contractual controls enforce it.
    Evidence guidance

    Internal communications, meeting minutes, or risk assessments acknowledging data location without mandating controls.

L2 Contractual

  • RES-L2-C1 Data processing agreements (DPAs) with all critical providers specify approved data residency regions (EU/EEA or Switzerland).
    Evidence guidance

    Executed DPAs with region-restriction clauses; legal review confirming coverage of all Tier-1 providers.

  • RES-L2-C2 Standard Contractual Clauses (SCCs) with supplementary technical and organisational measures are in place for any provider subject to third-country jurisdiction.
    Evidence guidance

    Signed SCC addenda (EU 2021/914 modules) with documented transfer impact assessments (TIAs).

  • RES-L2-C3 A transfer impact assessment (TIA) has been conducted evaluating the legal framework of each provider's jurisdiction.
    Evidence guidance

    Completed TIA documents referencing provider jurisdiction, government access laws, and supplementary measures adopted.

  • RES-L2-C4 The organisation has documented residual risk for metadata, support tickets, and telemetry data processed outside contracted regions.
    Evidence guidance

    Risk register entry or data flow diagram identifying metadata and ancillary data flows that fall outside DPA region restrictions.

L3 Controlled

  • RES-L3-C1 Geo-fencing is configured at the infrastructure level to restrict data storage and processing to approved regions (EU/EEA or Switzerland).
    Evidence guidance

    Cloud provider region-lock configurations, infrastructure-as-code templates with explicit region constraints, or sovereign cloud zone assignments.

  • RES-L3-C2 Data replication and backup targets are explicitly restricted to approved regions with no automatic failover to non-approved jurisdictions.
    Evidence guidance

    Replication policies, disaster recovery configurations, and backup target settings showing only approved regions.

  • RES-L3-C3 Regular audits (at least annually) verify that data residency controls are functioning as intended and no data has left approved regions.
    Evidence guidance

    Audit reports, compliance certificates, or third-party attestation reports confirming data residency enforcement.

L4 Autonomous

  • RES-L4-C1 All data is stored and processed on infrastructure physically located in Switzerland or an approved EU/EEA jurisdiction.
    Evidence guidance

    Data centre contracts and facility addresses confirming all infrastructure resides in approved jurisdictions.

  • RES-L4-C2 All infrastructure is operated by an entity with no foreign-jurisdiction parent company.
    Evidence guidance

    Corporate ownership documentation (commercial register extracts, shareholder disclosures) confirming no US or other foreign-jurisdiction parent entity.

  • RES-L4-C3 No cross-border data transfers occur for any purpose, including support, telemetry, software updates, or disaster recovery.
    Evidence guidance

    Network flow analysis, firewall rules, and egress monitoring confirming zero cross-border data flows. DNS, NTP, and update channels verified as domestic or EU-based.

  • RES-L4-C4 Physical security of data centre facilities is under organisational control or subject to a domestic-only trust chain with independent audit rights.
    Evidence guidance

    Physical access logs, facility security audit reports, and contractual audit-right clauses. For co-location: proof that facility operator is domestically owned.

  • RES-L4-C5 Administrative access to all infrastructure is restricted to personnel within approved jurisdictions, with no remote access paths from foreign-jurisdiction entities.
    Evidence guidance

    Access control policies, VPN and bastion host configurations, and HR records confirming all administrative personnel are based in approved jurisdictions.

Data Processing DSCM-PROC complete

L0 Unaware

  • PROC-L0-C1 The organisation has no documented understanding of where its data is processed - neither geographic location nor infrastructure type (shared, dedicated, on-premises) is known
    Evidence guidance

    Request processing location documentation from the provider; review service agreements for any mention of data processing locations or infrastructure details

  • PROC-L0-C2 No purpose limitation exists for data processing - the provider may use customer data for analytics, model training, product improvement, or other secondary purposes without explicit consent
    Evidence guidance

    Review the provider's terms of service and privacy policy for clauses granting broad processing rights; check for opt-out mechanisms

  • PROC-L0-C3 The organisation cannot identify which sub-processors or third parties have access to data during processing
    Evidence guidance

    Ask the provider for a sub-processor list; review data flow diagrams if available; check whether sub-processor notifications are part of the contract

L1 Dependent

  • PROC-L1-C1 The organisation knows which provider services process its data and has a general understanding of the geographic regions involved, but cannot enforce region restrictions technically
    Evidence guidance

    Review provider dashboards and service documentation for region settings; confirm whether region selection is advisory or enforced; check for region-pinning capabilities

  • PROC-L1-C2 Data is processed on shared, multi-tenant infrastructure without dedicated isolation guarantees - other tenants' workloads run on the same physical hardware
    Evidence guidance

    Review provider architecture documentation; check whether dedicated hosts, isolated VMs, or tenant separation mechanisms are available or in use

  • PROC-L1-C3 The provider's standard terms of service govern processing, with no negotiated data processing agreement (DPA) or purpose limitation beyond the provider's default policies
    Evidence guidance

    Compare the active agreement against a formal DPA template; identify whether purpose limitation, data minimisation, or processing restrictions have been negotiated

L2 Contractual

  • PROC-L2-C1 A GDPR-compliant DPA is in place with each processor, specifying processing purposes, data categories, retention periods, and the controller's instructions
    Evidence guidance

    Review executed DPAs for completeness against GDPR Art 28(3) requirements; verify that processing purposes are explicitly enumerated and not open-ended

  • PROC-L2-C2 Sub-processor lists are maintained and reviewed; the organisation has contractual rights to object to new sub-processors and receives advance notification of changes
    Evidence guidance

    Obtain current sub-processor lists from each provider; verify notification and objection mechanisms in the DPA; check whether sub-processor changes have been reviewed in the past 12 months

  • PROC-L2-C3 The organisation's ability to verify where processing occurs depends entirely on provider attestation - no independent technical mechanism confirms jurisdictional compliance
    Evidence guidance

    Review whether the organisation has any means beyond the provider's word to verify processing location; check for independent audit results, infrastructure transparency reports, or technical verification mechanisms

  • PROC-L2-C4 Data minimisation principles are contractually acknowledged - the provider commits to processing only the minimum data necessary for the specified purposes
    Evidence guidance

    Review DPA for data minimisation commitments; assess whether the provider's actual data collection aligns with minimisation principles through data flow analysis

L3 Controlled

  • PROC-L3-C1 Data processing occurs within confidential computing environments (TEEs, secure enclaves, or equivalent) that prevent the provider from accessing data during computation
    Evidence guidance

    Review deployment configurations for TEE/enclave usage (e.g., Intel SGX, AMD SEV, ARM TrustZone); verify attestation mechanisms are active; check provider documentation for confidential computing guarantees

  • PROC-L3-C2 Processing is technically restricted to approved jurisdictions through infrastructure controls - not merely contractual commitments
    Evidence guidance

    Review infrastructure-as-code for region-pinning configurations; verify that deployment policies block non-approved regions; test whether workloads can be launched in restricted regions

  • PROC-L3-C3 Comprehensive audit logs capture all data access events during processing, including provider administrative access, and logs are stored in a location controlled by the organisation
    Evidence guidance

    Review audit log configurations; verify that provider admin access is logged; confirm log storage is in an organisation-controlled location (separate account, SIEM, or on-premises)

L4 Autonomous

  • PROC-L4-C1 All data processing occurs on infrastructure owned or exclusively leased by the organisation - no shared cloud provider resources are involved in processing sensitive data
    Evidence guidance

    Review infrastructure inventory and hosting contracts; verify that processing hardware is exclusively allocated; confirm no fallback to shared cloud infrastructure exists

  • PROC-L4-C2 Zero provider access during processing is enforced - no external vendor, cloud provider, or third-party support personnel can access the processing environment without the organisation's explicit, audited authorisation
    Evidence guidance

    Review access control policies and network architecture; verify that remote access by vendors is disabled by default; audit access logs for any third-party access events

  • PROC-L4-C3 Air-gapped processing environments are available for the most sensitive workloads, with physical network isolation preventing any data exfiltration during computation
    Evidence guidance

    Inspect network architecture for air-gapped segments; verify physical isolation (no network interfaces, disabled wireless, controlled USB ports); review data transfer procedures for air-gapped environments

  • PROC-L4-C4 The organisation controls the full processing stack - hardware procurement, firmware, operating systems, runtime environments, and application code - with supply-chain verification at each layer
    Evidence guidance

    Review hardware procurement procedures for supply-chain integrity; verify firmware signing and validation; audit OS and runtime build pipelines for reproducibility and integrity checks

Legal & Contractual DSCM-LEGAL complete

L0 Unaware

  • LEGAL-L0-C1 Cloud and SaaS services are adopted by accepting click-through Terms of Service without any legal review or risk assessment
    Evidence guidance

    Request documentation of legal review for the five most critical cloud services. Absence of any review records satisfies this criterion.

  • LEGAL-L0-C2 No Data Processing Agreement (DPA) has been executed with any cloud provider processing personal data
    Evidence guidance

    Request the register of DPAs or equivalent processor agreements. Complete absence or inability to produce any signed DPA satisfies this criterion.

  • LEGAL-L0-C3 The organisation cannot identify which jurisdictions govern its cloud service agreements or where disputes would be adjudicated
    Evidence guidance

    Interview IT and procurement leadership regarding governing law and dispute resolution clauses in active contracts. Inability to answer confirms this criterion.

L1 Dependent

  • LEGAL-L1-C1 Data Processing Agreements have been signed with major cloud providers, but exclusively using the provider's standard template without modification
    Evidence guidance

    Collect signed DPAs and compare them against the provider's publicly available standard DPA. Identical or near-identical text confirms this criterion.

  • LEGAL-L1-C2 Service agreements contain foreign (typically US) governing law and jurisdiction clauses that have been accepted without legal assessment of their implications
    Evidence guidance

    Review the governing law and dispute resolution clauses in the top five cloud contracts. Acceptance of non-local jurisdiction without documented risk assessment confirms this criterion.

  • LEGAL-L1-C3 The provider retains the unilateral right to modify terms, sub-processors, or service scope with no more than email notification to the customer
    Evidence guidance

    Review the change-of-terms and sub-processor notification clauses in active agreements. Unilateral provider rights with notification-only obligations confirm this criterion.

L2 Contractual

  • LEGAL-L2-C1 Data Processing Agreements have been negotiated with material amendments - including enhanced audit rights, incident notification timelines, and sub-processor approval mechanisms - beyond the provider's standard template
    Evidence guidance

    Compare executed DPAs against the provider's standard template. Identify negotiated amendments documented in addenda, side letters, or redlined versions. At least three material amendments must be evidenced.

  • LEGAL-L2-C2 Standard Contractual Clauses (SCCs) or equivalent transfer mechanisms are in place for all international data transfers, with Transfer Impact Assessments completed
    Evidence guidance

    Request executed SCCs (EU Commission Module 2 or Module 3 as applicable) and associated Transfer Impact Assessments (TIAs) for each cross-border transfer. Both must exist for each transfer to satisfy this criterion.

  • LEGAL-L2-C3 Sub-processor lists are actively monitored, with changes tracked and recorded as they are notified by providers
    Evidence guidance

    Request the sub-processor monitoring log showing receipt dates, change descriptions, and tracking entries for all provider notifications within the past 12 months.

  • LEGAL-L2-C4 A documented process exists for reviewing new sub-processors and exercising objection rights when sub-processor changes present unacceptable risk
    Evidence guidance

    Request the sub-processor review procedure, evidence of review assessments when new sub-processors were notified, and any objection correspondence sent to providers.

  • LEGAL-L2-C5 Legal counsel with data protection expertise has reviewed all cloud service agreements governing critical systems
    Evidence guidance

    Request legal review memoranda, risk assessments, or counsel opinion letters for the top five cloud service agreements. Substantive analysis - not mere checkbox review - must be evidenced.

L3 Controlled

  • LEGAL-L3-C1 Custom enterprise agreements - not provider standard ToS with amendments - govern all critical cloud service relationships, with EU or Swiss governing law and local jurisdiction for dispute resolution
    Evidence guidance

    Review the master service agreement for each critical cloud service. The agreement must be a bespoke or enterprise-negotiated contract (not amended standard ToS) with an EU or Swiss governing law clause and a local dispute resolution forum.

  • LEGAL-L3-C2 Bilateral termination rights are contractually established, including the customer's right to terminate for material breach, change of control, or regulatory necessity
    Evidence guidance

    Review termination clauses in enterprise agreements. Customer termination rights must exist beyond simple convenience termination, covering at least material breach, change of control, and regulatory necessity scenarios.

  • LEGAL-L3-C3 Data portability and extraction obligations are explicitly defined in all critical cloud service contracts, specifying format, timeline, and provider assistance requirements upon termination
    Evidence guidance

    Review exit and termination clauses for data portability provisions. Contracts must specify the data format (e.g., open standards), extraction timeline (e.g., 90 days), and provider obligations to assist with migration.

  • LEGAL-L3-C4 Source code, configuration, or data escrow arrangements are in place for critical service dependencies, with defined release conditions including provider insolvency, material breach, or service discontinuation
    Evidence guidance

    Request executed escrow agreements with a reputable escrow agent. Review release conditions and verify that escrow deposits are current (updated within the last 12 months).

  • LEGAL-L3-C5 CLOUD Act and foreign government data access risks are mitigated through a combination of contractual commitments and structural measures - such as EU-only data residency with EU-based operating entities, legal challenge undertakings, and data access architecture that limits provider access to cleartext
    Evidence guidance

    Review the CLOUD Act mitigation strategy. Evidence must include both contractual provisions (challenge commitments, notification obligations, EU entity operations) and technical or structural measures (encryption architecture, access controls, EU data boundary programmes).

L4 Autonomous

  • LEGAL-L4-C1 All critical infrastructure and services are either self-hosted or operated by sovereign cloud providers incorporated and operating exclusively within the local jurisdiction, with no foreign parent entity, subsidiary relationship, or contractual obligation that could create foreign law exposure
    Evidence guidance

    Review the corporate structure and ownership chain of all infrastructure and service providers. Verify through commercial register extracts that no foreign entity has ownership, control, or contractual rights that could trigger foreign government access obligations. Self-hosted infrastructure satisfies this criterion directly.

  • LEGAL-L4-C2 The software stack for critical services is composed of open-source components under permissive or copyleft licences, eliminating proprietary vendor lock-in and ensuring the organisation can fork, modify, or replace any component without contractual constraint
    Evidence guidance

    Request a software bill of materials (SBOM) for critical services. Verify that all components are available under recognised open-source licences (e.g., MIT, Apache 2.0, GPL, AGPL). No proprietary components should exist in the critical path.

  • LEGAL-L4-C3 All data processing agreements, service contracts, and infrastructure arrangements are governed exclusively by local law (EU member state or Swiss law) with no clause, mechanism, or corporate relationship that could subject data to foreign jurisdiction
    Evidence guidance

    Conduct a comprehensive legal review of all contracts, corporate structures, and service arrangements. A legal opinion from qualified counsel confirming zero foreign law exposure must be available.

Logging & Audit DSCM-AUDIT complete

L0 Unaware

  • AUDIT-L0-C1 The organisation has no awareness of which external parties generate, store, or have access to its operational logs.
    Evidence guidance

    Ask the organisation to identify where its logs are stored and who can access them. Inability to answer satisfies this criterion.

  • AUDIT-L0-C2 Logs exist only as provider defaults (e.g., basic cloud console activity logs) and are neither actively monitored nor forwarded to any centralised system.
    Evidence guidance

    Review cloud provider logging configurations and ask operations staff whether any log aggregation or review process exists.

L1 Dependent

  • AUDIT-L1-C1 The organisation uses provider-native logging services as its primary logging infrastructure, with log storage residing entirely within the provider's platform.
    Evidence guidance

    Verify that logging services such as AWS CloudWatch, Azure Monitor, or GCP Cloud Logging are enabled. Confirm that no external log aggregation or SIEM is in use.

  • AUDIT-L1-C2 Log format, schema, and retention periods are determined by the provider's defaults or are only configurable within provider-defined constraints.
    Evidence guidance

    Review log retention configurations in the provider console. Check whether custom log schemas or formats have been defined. Provider-default settings with no organisational override satisfy this criterion.

  • AUDIT-L1-C3 Log data cannot be exported in a timely or automated manner to an independent storage system outside the provider's platform.
    Evidence guidance

    Attempt to export a representative log dataset. Check whether automated export pipelines (e.g., to S3, Azure Blob, or an external SIEM) are configured. Absence of automated export satisfies this criterion.

L2 Contractual

  • AUDIT-L2-C1 The Data Processing Agreement (DPA) or service contract specifies minimum log retention periods, log categories to be captured, and the organisation's right to export log data.
    Evidence guidance

    Review the DPA and service agreements for explicit clauses on log retention, log types, and export rights. Generic clauses without specific retention periods do not satisfy this criterion.

  • AUDIT-L2-C2 Automated log export pipelines are operational, forwarding provider-generated logs to an organisation-controlled storage system on a near-real-time or daily basis.
    Evidence guidance

    Verify the existence of automated log export configurations (e.g., CloudWatch Subscription Filters, Azure Event Hub export, Pub/Sub to external storage). Check that exports are current and not stale.

  • AUDIT-L2-C3 A formal log retention policy defines retention periods per log category, aligned with regulatory requirements (GDPR, NIS2, DORA).
    Evidence guidance

    Request the log retention policy document. Confirm that retention periods meet regulatory minimums (e.g., 1 year for NIS2, up to 5 years for DORA).

  • AUDIT-L2-C4 The provider retains access to log data and metadata, and the organisation has not established independent log integrity verification.
    Evidence guidance

    Confirm that log data passes through provider infrastructure before reaching the organisation's storage. Verify that no log integrity mechanisms (e.g., hash chains, write-once storage) are in place on the organisation's copy.

L3 Controlled

  • AUDIT-L3-C1 A self-managed SIEM platform is operational, serving as the primary log analysis and alerting system.
    Evidence guidance

    Verify the SIEM deployment (e.g., Wazuh, ELK, OpenSearch, Graylog). Confirm it is the primary platform used for log analysis and security alerting, not a secondary or unused installation.

  • AUDIT-L3-C2 All log storage resides within a sovereign jurisdiction, with documented data residency controls ensuring logs do not leave the designated jurisdiction.
    Evidence guidance

    Verify the physical location of SIEM storage infrastructure. Review data residency configurations and confirm that log replication or backup does not cross jurisdictional boundaries.

L4 Autonomous

  • AUDIT-L4-C1 All logging infrastructure - collection, processing, storage, and analysis - runs on organisation-owned or organisation-controlled hardware with no dependency on cloud provider IaaS for the logging pipeline itself.
    Evidence guidance

    Verify that the SIEM, log storage, and analysis platforms run on infrastructure owned or directly leased by the organisation (co-location or on-premises). Confirm that no component of the logging pipeline depends on a cloud provider's compute, storage, or networking services.

  • AUDIT-L4-C2 Audit trails are cryptographically signed using organisation-controlled keys with independent timestamping from a trusted third-party timestamping authority (TSA), producing legally defensible, non-repudiable audit records.
    Evidence guidance

    Review the cryptographic signing mechanism for log entries. Verify that signing keys are held in an HSM or equivalent secure key store under organisational control. Confirm that timestamps are obtained from a qualified TSA (e.g., RFC 3161 compliant) independent of the cloud provider.

  • AUDIT-L4-C3 An air-gapped log archive exists for critical audit records, physically isolated from all networked systems, with documented procedures for secure write and read operations.
    Evidence guidance

    Inspect the air-gapped archive facility. Verify physical isolation (no network connectivity). Review the procedures for transferring log data to the archive and for retrieving records during investigations. Confirm that archive integrity is periodically verified.

  • AUDIT-L4-C4 The organisation generates its own telemetry independently of provider logging, ensuring forensic capability even if provider logs are unavailable or compromised.
    Evidence guidance

    Verify that the organisation operates independent telemetry collection (e.g., osquery, Beats, Fluentd, custom agents) that provides forensic coverage without relying on provider-generated log data as the sole source.

Network Infrastructure DSCM-NET complete

L0 Unaware

  • NET-L0-C1 The organisation has no inventory of its DNS providers, CDN services, or network dependencies
    Evidence guidance

    Request documentation of DNS registrars, nameserver providers, CDN services, and ISP contracts; verify whether a network dependency register exists in any form (spreadsheet, CMDB, wiki)

  • NET-L0-C2 The organisation has no understanding of which external parties can modify its network configuration - routing, DNS, or firewall changes could be made by providers without the organisation's awareness
    Evidence guidance

    Ask who can make changes to DNS records, firewall rules, or routing configuration; determine whether the organisation would know if a provider made unilateral changes to its network setup

  • NET-L0-C3 DNS domain registrations and critical network accounts are tied to individual employee credentials rather than organisational accounts with role-based access
    Evidence guidance

    Audit DNS registrar account ownership, CDN console access, and ISP portal credentials; check whether accounts are registered under personal email addresses or shared credentials

L1 Dependent

  • NET-L1-C1 All DNS, CDN, and network routing are managed by a single provider with no alternative or failover configuration
    Evidence guidance

    Identify the DNS registrar and nameserver provider; confirm whether a secondary DNS provider or alternative CDN exists. Check for any documented failover or disaster recovery plan for network services.

  • NET-L1-C2 The organisation cannot modify DNS records, firewall rules, or routing policies without going through the provider's support process
    Evidence guidance

    Attempt to identify how DNS changes are made; verify whether the organisation has API or console access, or whether all changes require a support ticket with the provider

  • NET-L1-C3 Network monitoring relies entirely on the provider's built-in dashboards with no independent verification of availability or performance
    Evidence guidance

    Review monitoring tools in use; confirm whether any external or self-hosted monitoring (e.g., uptime checks, synthetic tests) exists independently of the primary network provider

L2 Contractual

  • NET-L2-C1 The organisation has contractual authority to manage its own DNS records and CDN caching policies through provider-supplied tooling, including API access for programmatic management
    Evidence guidance

    Confirm API or console access to DNS and CDN management; verify that the contract grants the organisation self-service capability for record changes, cache purges, and configuration updates without requiring provider intervention

  • NET-L2-C2 Data Processing Agreements are in place with all network providers that specify the jurisdictional scope of network metadata processing, including DNS query logs, CDN access logs, and traffic analytics
    Evidence guidance

    Review signed DPAs for DNS, CDN, and ISP providers; confirm that they address the processing of network metadata (IP addresses, query logs, access logs) and specify geographic restrictions on where this data is processed and stored

  • NET-L2-C3 Network access logs, DNS query logs, and firewall logs are exported to an organisation-controlled log management system
    Evidence guidance

    Verify that CDN access logs, DNS query logs, and firewall logs are forwarded to an organisation-controlled SIEM or log management platform rather than retained solely in the provider's console

  • NET-L2-C4 Log retention periods for all network metadata meet applicable regulatory requirements
    Evidence guidance

    Confirm that retention policies for network logs exceed the provider's default and satisfy applicable regulatory requirements (typically 12+ months); verify that retention is enforced through automated lifecycle policies

L3 Controlled

  • NET-L3-C1 DNS is managed through organisation-controlled authoritative nameservers with automated failover to a secondary DNS provider
    Evidence guidance

    Inspect the authoritative DNS infrastructure; confirm that the organisation operates its own nameservers (e.g., PowerDNS, Knot DNS, BIND) or controls the configuration of a dedicated DNS provider. Verify automated failover through DNS health checks and secondary provider configuration.

  • NET-L3-C2 DNSSEC is deployed and validated on all organisational domains
    Evidence guidance

    Confirm DNSSEC signing is active on all authoritative zones; verify that DNSSEC validation succeeds using external validation tools (e.g., DNSViz, Verisign DNSSEC Debugger). Check that DS records are published in parent zones.

  • NET-L3-C3 CDN and DDoS mitigation services are provided by European-headquartered providers or self-managed edge infrastructure, eliminating US-jurisdictional exposure for content delivery
    Evidence guidance

    Identify all CDN and DDoS mitigation providers; confirm their legal incorporation jurisdiction. If self-managed, verify the geographic distribution and capacity of edge nodes. Acceptable European providers include those headquartered and incorporated in EU/EEA or Swiss jurisdictions.

L4 Autonomous

  • NET-L4-C1 The organisation holds its own AS number and provider-independent IP address allocations through RIPE NCC, with RPKI Route Origin Authorisations published for all announced prefixes
    Evidence guidance

    Verify the organisation's ASN and IP allocations in the RIPE database. Check that RPKI Route Origin Authorisations (ROAs) are published for all announced prefixes. Verify the organisation appears in public BGP routing tables under its own ASN.

  • NET-L4-C2 BGP peering is established at multiple European internet exchange points
    Evidence guidance

    Confirm BGP peering sessions at two or more European IXPs (e.g., DE-CIX, SwissIX, AMS-IX). Verify active session status and review peering agreements. Check that the organisation maintains both public peering (route servers) and private peering with critical partners.

  • NET-L4-C3 All DNS infrastructure, both authoritative nameservers and recursive resolvers, is operated on organisation-controlled hardware within a known legal jurisdiction, with DNSSEC fully deployed and validated
    Evidence guidance

    Audit the complete DNS stack; confirm that authoritative nameservers and recursive resolvers run on organisation-owned or exclusively leased infrastructure. Verify DNSSEC signing (authoritative) and validation (recursive). Confirm that no external recursive resolver (e.g., Google 8.8.8.8, Cloudflare 1.1.1.1) is used as a fallback for organisational systems.

  • NET-L4-C4 DDoS mitigation is operated on organisation-controlled infrastructure using BGP-based techniques (RTBH, flowspec) or organisation-managed scrubbing capacity, with no dependency on a single external mitigation provider
    Evidence guidance

    Review DDoS mitigation architecture; confirm the organisation can implement BGP Remotely Triggered Black Hole (RTBH) routing and/or BGP flowspec rules at its IXP peers. If scrubbing centres are used, verify they are European-operated and that the organisation maintains independent mitigation capability.

  • NET-L4-C5 The organisation maintains internal network connectivity and critical service availability during a complete loss of external internet connectivity
    Evidence guidance

    Request documentation of network isolation testing; confirm that internal DNS resolution, authentication, and critical application access function when external connectivity is severed. Verify that an isolation test has been conducted within the past 12 months.

Compute & Runtime DSCM-COMP draft

L0 Unaware

  • COMP-L0-C1 The organisation has no inventory of its compute environments, runtime platforms, or execution dependencies
  • COMP-L0-C2 Workloads run on unknown or uncontrolled infrastructure with no visibility into resource allocation or geographic placement

L1 Dependent

  • COMP-L1-C1 All production workloads execute on a single cloud provider's managed services (e.g., AWS Lambda, Azure App Service, Google Cloud Run) with provider-specific runtime dependencies
  • COMP-L1-C2 The organisation cannot migrate workloads to an alternative provider without significant re-engineering

L2 Contractual

  • COMP-L2-C1 Contracts with compute providers include explicit terms for geographic region selection, guaranteed resource allocation, and data processing boundaries
  • COMP-L2-C2 The organisation has documented which workloads use provider-specific features and has a preliminary abstraction strategy

L3 Controlled

  • COMP-L3-C1 All production workloads run as OCI-standard containers orchestrated by the organisation through Kubernetes or equivalent platform
  • COMP-L3-C2 Workload migration to an alternative compute provider has been tested and can be executed within a defined recovery time objective

L4 Autonomous

  • COMP-L4-C1 Critical workloads run on organisation-owned or dedicated co-located hardware with no shared tenancy
  • COMP-L4-C2 Confidential computing or trusted execution environments are deployed for sensitive workloads, ensuring code and data remain encrypted during processing

Supply Chain DSCM-SUPPLY draft

L0 Unaware

  • SUPPLY-L0-C1 The organisation has no Software Bill of Materials (SBOM) and cannot enumerate its third-party dependencies
  • SUPPLY-L0-C2 Dependencies are pulled directly from public registries at build time with no pinning, verification, or caching

L1 Dependent

  • SUPPLY-L1-C1 Dependencies are tracked through a provider-managed tool (e.g., GitHub Dependabot, Snyk) but the organisation has no independent SBOM generation
  • SUPPLY-L1-C2 Vulnerability alerts are received from the provider but there is no defined SLA for remediation or escalation

L2 Contractual

  • SUPPLY-L2-C1 Contracts with software vendors require SBOM delivery in a standard format (SPDX or CycloneDX) and timely disclosure of known vulnerabilities
  • SUPPLY-L2-C2 Internal policy defines approved dependency sources, licence compatibility requirements, and vulnerability remediation SLAs

L3 Controlled

  • SUPPLY-L3-C1 All builds produce machine-readable SBOMs automatically, and a private package registry serves as the sole source for all production dependencies
  • SUPPLY-L3-C2 Dependency signatures and provenance attestations (e.g., SLSA, Sigstore) are verified before any package enters the private registry

L4 Autonomous

  • SUPPLY-L4-C1 Critical dependencies are audited at the source-code level, and the organisation maintains forks or mirrors of essential open-source components
  • SUPPLY-L4-C2 End-to-end supply chain provenance is cryptographically verifiable from source code to production deployment, meeting SLSA Level 3 or higher

Exit Strategy DSCM-EXIT draft

L0 Unaware

  • EXIT-L0-C1 The organisation has no documented exit plan for any of its critical service providers
  • EXIT-L0-C2 No assessment has been performed to identify vendor lock-in risks or migration barriers

L1 Dependent

  • EXIT-L1-C1 The organisation can export its data from critical providers but only through manual processes or provider-specific tooling
  • EXIT-L1-C2 No timeline, cost estimate, or resource plan exists for migrating away from any critical provider

L2 Contractual

  • EXIT-L2-C1 Contracts with critical providers include portability clauses requiring data export in open, documented formats within defined timeframes
  • EXIT-L2-C2 Transition assistance periods are contractually guaranteed, providing support during migration to an alternative provider

L3 Controlled

  • EXIT-L3-C1 Detailed migration runbooks exist for all critical provider dependencies, and at least one full migration drill has been completed successfully
  • EXIT-L3-C2 Alternative provider environments are pre-configured and validated, ready to receive migrated workloads and data within defined recovery time objectives

L4 Autonomous

  • EXIT-L4-C1 All systems are architected for provider-agnostic operation using open standards, portable formats, and abstraction layers that eliminate provider-specific dependencies
  • EXIT-L4-C2 Provider switching can be executed as a routine operational procedure with near-zero downtime and no data loss

Incident Response DSCM-IR draft

L0 Unaware

  • IR-L0-C1 The organisation has no documented incident response plan, and no individual or team is responsible for security incident management
  • IR-L0-C2 No security monitoring or alerting is in place; incidents are typically discovered by end users or external parties

L1 Dependent

  • IR-L1-C1 Security monitoring and incident detection are handled exclusively by the cloud or managed service provider with no independent organisational capability
  • IR-L1-C2 Incident response is reactive, triggered by provider notifications, with no organisational playbooks for containment or recovery

L2 Contractual

  • IR-L2-C1 Contracts with service providers include incident notification SLAs, forensic data access rights, and defined escalation procedures
  • IR-L2-C2 The organisation maintains basic incident response playbooks covering the most likely threat scenarios, with designated internal contacts

L3 Controlled

  • IR-L3-C1 The organisation operates an internal SOC or equivalent security operations function with independent monitoring, detection, and investigation capabilities
  • IR-L3-C2 Incident response procedures are regularly tested through tabletop exercises and simulated attacks, with findings incorporated into updated playbooks

L4 Autonomous

  • IR-L4-C1 The organisation conducts proactive threat hunting using proprietary detection rules, integrated threat intelligence, and advanced analytics across all environments
  • IR-L4-C2 Automated incident response orchestration (SOAR) handles common incident types end-to-end, from detection through containment to recovery, with minimal human intervention

Governance & Compliance DSCM-GOV draft

L0 Unaware

  • GOV-L0-C1 The organisation has no governance framework, policy, or designated role addressing digital sovereignty or technology risk
  • GOV-L0-C2 Compliance with data protection and security regulations is handled reactively, with no proactive monitoring or assessment

L1 Dependent

  • GOV-L1-C1 The organisation relies on provider certifications (e.g., ISO 27001, SOC 2) as its primary evidence of compliance, with no independent assessment
  • GOV-L1-C2 No internal governance body or process evaluates technology decisions through a sovereignty lens

L2 Contractual

  • GOV-L2-C1 The organisation maintains a formal compliance programme with documented policies covering data protection, security, and sovereignty requirements
  • GOV-L2-C2 Provider contracts include compliance obligations, audit rights, and regular reporting requirements aligned with the organisation's governance framework

L3 Controlled

  • GOV-L3-C1 A cross-functional sovereignty governance board with executive sponsorship reviews all significant technology decisions for sovereignty implications
  • GOV-L3-C2 Continuous compliance monitoring is in place across all sovereignty dimensions, with automated controls validation and real-time dashboards

L4 Autonomous

  • GOV-L4-C1 The organisation actively contributes to industry standards, regulatory frameworks, and best practices for digital sovereignty governance
  • GOV-L4-C2 Sovereignty governance is transparent, with public reporting on the organisation's sovereignty posture and continuous improvement commitments