Data Processing complete
Control over how data is processed, transformed, and accessed by compute workloads
L0 Unaware
No awareness of where or how data is processed; the provider operates without restrictions on processing location, method, or access
Criteria
PROC-L0-C1The organisation has no documented understanding of where its data is processed - neither geographic location nor infrastructure type (shared, dedicated, on-premises) is knownEvidence guidance
Request processing location documentation from the provider; review service agreements for any mention of data processing locations or infrastructure details
PROC-L0-C2No purpose limitation exists for data processing - the provider may use customer data for analytics, model training, product improvement, or other secondary purposes without explicit consentEvidence guidance
Review the provider's terms of service and privacy policy for clauses granting broad processing rights; check for opt-out mechanisms
PROC-L0-C3The organisation cannot identify which sub-processors or third parties have access to data during processingEvidence guidance
Ask the provider for a sub-processor list; review data flow diagrams if available; check whether sub-processor notifications are part of the contract
Indicators
- Staff cannot name the cloud region or data centre where production workloads run
- No data processing agreement (DPA) exists with any service provider
- Provider terms include broad rights to use customer data for unspecified purposes
- No inventory of sub-processors or third-party data access exists
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-5, art-6 | critical | Processing without documented purpose limitation violates the purpose limitation (Art 5(1)(b)) and lawfulness (Art 6) principles |
NDSG | art-9 | high | Cross-border data processing without awareness may violate Art 9 nDSG disclosure requirements for transfers abroad |
NIS2 | art-21 | high | Absence of processing controls undermines the risk management measures required by Art 21 |
Upgrade path
Catalogue all services that process organisational data and request processing location details from each provider. Review provider terms of service for purpose limitation clauses. Begin drafting a sub-processor inventory.
Risk if stagnant
Without visibility into processing activities, the organisation cannot assess regulatory compliance, detect unauthorised data use, or respond to data subject requests. A provider could relocate processing to a jurisdiction with incompatible data protection standards without the organisation's knowledge.
Typical characteristics
- No processing inventory. The organisation uses cloud services, SaaS platforms, and third-party tools without knowing which data centres or regions handle its workloads. Infrastructure could span multiple jurisdictions without anyone being aware.
- Unrestricted provider access. The provider's operations, support, and engineering teams can access customer data without restriction. No technical barriers (encryption, access controls) limit what provider personnel can see or do.
- No purpose limitation. Terms of service may grant the provider rights to use customer data for analytics, advertising, machine learning training, or product improvement - and the organisation has not reviewed or negotiated these terms.
- Unknown sub-processors. Data may flow through multiple third parties during processing - CDNs, analytics platforms, logging services - without the organisation's knowledge or consent.
Why this is dangerous
When an organisation does not understand its processing landscape, it cannot satisfy even the most fundamental regulatory obligations. GDPR Art 5(1)(b) requires that data be collected for specified, explicit, and legitimate purposes. If the organisation cannot articulate what processing occurs, it cannot demonstrate lawful purpose.
Beyond compliance, the absence of processing awareness creates operational blind spots. Performance issues, data leaks, or service outages in unknown sub-processors can cascade without any ability to diagnose or respond.
Sovereignty implications
Sovereignty over data processing is non-existent at this level. The organisation has outsourced not just the processing itself but all decisions about how processing is conducted. This represents complete dependency - the provider could change processing locations, introduce new sub-processors, or alter processing methods without the organisation having any mechanism to detect or prevent it.
L1 Dependent
Provider controls the processing pipeline on shared multi-tenant infrastructure; the organisation has basic awareness but no technical isolation or enforceable processing constraints
Criteria
PROC-L1-C1The organisation knows which provider services process its data and has a general understanding of the geographic regions involved, but cannot enforce region restrictions technicallyEvidence guidance
Review provider dashboards and service documentation for region settings; confirm whether region selection is advisory or enforced; check for region-pinning capabilities
PROC-L1-C2Data is processed on shared, multi-tenant infrastructure without dedicated isolation guarantees - other tenants' workloads run on the same physical hardwareEvidence guidance
Review provider architecture documentation; check whether dedicated hosts, isolated VMs, or tenant separation mechanisms are available or in use
PROC-L1-C3The provider's standard terms of service govern processing, with no negotiated data processing agreement (DPA) or purpose limitation beyond the provider's default policiesEvidence guidance
Compare the active agreement against a formal DPA template; identify whether purpose limitation, data minimisation, or processing restrictions have been negotiated
Indicators
- Provider dashboard shows region selection, but no technical enforcement prevents processing in other regions
- The organisation relies on the provider's standard terms rather than a negotiated DPA
- No tenant isolation verification has been performed - the organisation assumes logical separation without evidence
- Sub-processor notifications arrive via email but are not reviewed or acted upon
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-28, art-32 | high | Using a processor without a compliant DPA (Art 28) and without ensuring appropriate technical measures (Art 32) on shared infrastructure exposes the controller to enforcement action |
NDSG | art-9 | high | Processing on shared infrastructure in potentially unknown jurisdictions may fail nDSG Art 9 requirements for adequate protection during cross-border processing |
DORA | art-28 | medium | Financial entities relying on shared processing without contractual controls may not meet DORA Art 28 requirements for ICT third-party risk management |
Upgrade path
Negotiate and execute a GDPR-compliant DPA with each processor, including explicit purpose limitation, sub-processor approval rights, and audit clauses. Evaluate provider options for dedicated or isolated compute. Establish a process to review and approve sub-processor changes.
Risk if stagnant
Multi-tenant processing without isolation guarantees exposes the organisation to noisy-neighbour performance impacts, side-channel attacks, and regulatory challenges. Without a DPA, the organisation has no contractual basis to enforce processing restrictions or hold the provider accountable for data misuse.
Typical characteristics
- Provider-managed pipeline. All compute, transformation, and data access decisions are made by the provider. The organisation selects a service tier and region but has no influence over how workloads are scheduled, where intermediate data is stored, or how processing resources are allocated.
- Multi-tenant infrastructure. Workloads run on shared physical hardware alongside other customers. Logical isolation (separate VMs, containers) may exist, but there are no guarantees of physical separation or protection against side-channel attacks.
- Default terms govern processing. The provider's standard terms of service or a click-through DPA define the processing relationship. These typically grant the provider broad latitude and offer limited purpose restriction.
- Passive sub-processor awareness. The provider may publish a sub-processor list or send change notifications, but the organisation does not actively monitor, review, or respond to changes.
Why this is dangerous
Shared infrastructure introduces risks that are difficult to quantify. Side-channel vulnerabilities - such as those exploiting shared CPU caches, memory buses, or network paths - have been demonstrated repeatedly in academic and real-world settings. While cloud providers invest heavily in mitigating these risks, the fundamental exposure remains when workloads share physical resources.
Without a negotiated DPA, the organisation lacks contractual tools to enforce processing restrictions. If the provider changes its processing behaviour - introducing a new sub-processor, shifting workloads to a different region, or using data for secondary purposes - the organisation may have no legal basis to object.
Sovereignty implications
Sovereignty at this level is nominal. The organisation knows who processes its data but cannot materially influence how that processing occurs. Processing decisions remain with the provider, and the organisation's ability to enforce constraints depends entirely on the provider's goodwill and standard policies rather than on technical or contractual mechanisms within its control.
L2 Contractual
Data processing agreements define scope, purpose limitation, and sub-processor governance, but technical processing controls remain with the provider
Criteria
PROC-L2-C1A GDPR-compliant DPA is in place with each processor, specifying processing purposes, data categories, retention periods, and the controller's instructionsEvidence guidance
Review executed DPAs for completeness against GDPR Art 28(3) requirements; verify that processing purposes are explicitly enumerated and not open-ended
PROC-L2-C2Sub-processor lists are maintained and reviewed; the organisation has contractual rights to object to new sub-processors and receives advance notification of changesEvidence guidance
Obtain current sub-processor lists from each provider; verify notification and objection mechanisms in the DPA; check whether sub-processor changes have been reviewed in the past 12 months
PROC-L2-C3The organisation's ability to verify where processing occurs depends entirely on provider attestation - no independent technical mechanism confirms jurisdictional complianceEvidence guidance
Review whether the organisation has any means beyond the provider's word to verify processing location; check for independent audit results, infrastructure transparency reports, or technical verification mechanisms
PROC-L2-C4Data minimisation principles are contractually acknowledged - the provider commits to processing only the minimum data necessary for the specified purposesEvidence guidance
Review DPA for data minimisation commitments; assess whether the provider's actual data collection aligns with minimisation principles through data flow analysis
Indicators
- Executed DPAs exist for all major processors with clearly defined processing purposes
- A sub-processor register is maintained and reviewed at least annually
- Provider compliance certifications (SOC 2, ISO 27001) are collected and reviewed
- Processing location is specified in contracts but has not been independently verified
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-5, art-28 | medium | Compliant DPAs satisfy Art 28 processor requirements and support Art 5 purpose limitation, but absence of technical verification limits assurance |
NDSG | art-9 | medium | Contractual safeguards for cross-border processing align with Art 9 nDSG, though technical enforcement gaps reduce confidence |
NIS2 | art-21 | medium | Contractual supply-chain risk management addresses NIS2 Art 21(2)(d), but technical controls are needed for full compliance |
DORA | art-28, art-30 | medium | DPAs with ICT providers partially satisfy DORA Art 28-30 contractual requirements, though operational resilience testing may still be lacking |
Upgrade path
Implement technical processing controls: deploy workloads in confidential computing environments (TEEs/enclaves) where available, enable BYOK for data processed at rest and in transit, and establish independent audit mechanisms to verify processing locations and access patterns.
Risk if stagnant
Contractual controls without technical enforcement create a trust-but-don't-verify posture. The organisation depends on provider honesty and competence to honour processing restrictions. A provider breach, policy change, or internal failure could violate processing constraints without detection. Regulatory auditors increasingly expect technical evidence, not just contractual commitments.
Typical characteristics
- Comprehensive DPAs. Each processor relationship is governed by a DPA that meets GDPR Art 28(3) requirements: specified processing purposes, data categories, duration, controller instructions, and obligations upon termination. These are negotiated documents, not click-through defaults.
- Sub-processor governance. The organisation maintains a register of sub-processors for each provider. DPAs include advance notification requirements and objection rights when sub-processors change. Reviews occur at least annually.
- Contractual geographic restrictions. Processing is limited to named jurisdictions or regions through DPA clauses. The provider attests to compliance, and the organisation may collect compliance certifications (SOC 2, ISO 27001) as supporting evidence.
- Purpose limitation is defined, not enforced. The DPA specifies permitted processing purposes, but the organisation has no technical mechanism to detect if the provider processes data beyond those purposes.
Why this matters
Contractual controls represent a significant step forward from Level 1. They provide a legal framework for enforcement, establish clear expectations, and create accountability mechanisms. Many organisations operate successfully at this level, and it satisfies the baseline requirements of most data protection regulations.
However, contracts are only as strong as the ability to verify compliance. A DPA that restricts processing to EU data centres is meaningless if the organisation cannot independently confirm that processing actually stays within those boundaries. Provider compliance certifications offer some assurance but are point-in-time assessments that may not reflect continuous operations.
Sovereignty implications
Sovereignty at Level 2 is contractual rather than technical. The organisation has defined what processing should look like and has legal tools to enforce those definitions. But the actual enforcement depends on the provider's operational integrity and the organisation's ability to detect violations - both of which have inherent limitations. True processing sovereignty requires technical controls that make policy violations technically impossible, not merely contractually prohibited.
L3 Controlled
Confidential computing, jurisdiction-restricted processing, technical isolation, and comprehensive audit logging provide verifiable control over data processing
Criteria
PROC-L3-C1Data processing occurs within confidential computing environments (TEEs, secure enclaves, or equivalent) that prevent the provider from accessing data during computationEvidence guidance
Review deployment configurations for TEE/enclave usage (e.g., Intel SGX, AMD SEV, ARM TrustZone); verify attestation mechanisms are active; check provider documentation for confidential computing guarantees
PROC-L3-C2Processing is technically restricted to approved jurisdictions through infrastructure controls - not merely contractual commitmentsEvidence guidance
Review infrastructure-as-code for region-pinning configurations; verify that deployment policies block non-approved regions; test whether workloads can be launched in restricted regions
PROC-L3-C3Comprehensive audit logs capture all data access events during processing, including provider administrative access, and logs are stored in a location controlled by the organisationEvidence guidance
Review audit log configurations; verify that provider admin access is logged; confirm log storage is in an organisation-controlled location (separate account, SIEM, or on-premises)
Indicators
- Confidential computing attestation reports are generated and verified for production workloads
- Infrastructure-as-code policies enforce region restrictions and block deployment to non-approved jurisdictions
- Audit logs for data access are ingested into the organisation's own SIEM or log management platform
- Key revocation tests confirm that the provider loses access to processing data when the organisation withdraws keys
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-5, art-32 | low | Confidential computing and BYOK provide state-of-the-art technical measures (Art 32) and support integrity and confidentiality principles (Art 5(1)(f)) |
NDSG | art-9 | low | Technical jurisdiction controls combined with confidential computing exceed Art 9 nDSG requirements for adequate data protection during processing |
NIS2 | art-21 | low | Technical processing controls, audit logging, and encryption in use satisfy NIS2 Art 21 requirements for risk management and incident detection |
DORA | art-28, art-30 | low | Confidential computing and technical isolation support DORA Art 28-30 requirements for ICT risk management and operational resilience of critical services |
Upgrade path
Migrate processing workloads to self-hosted or on-premises infrastructure where full hardware and software stack control is required. Implement air-gapped processing environments for the most sensitive workloads. Eliminate all provider access to processing infrastructure, including administrative and support access.
Risk if stagnant
While Level 3 provides strong technical controls, the organisation still depends on the provider's hardware, firmware, and hypervisor integrity. Supply-chain compromises at the silicon or firmware level could undermine TEE guarantees. Organisations with the highest sovereignty requirements - such as those handling classified data or operating in sectors with strict national security mandates - may find residual provider dependency unacceptable.
Typical characteristics
- Confidential computing. Production workloads run within trusted execution environments (TEEs) such as Intel SGX enclaves, AMD SEV-SNP virtual machines, or equivalent technologies. These environments encrypt data in use, preventing the cloud provider's staff, hypervisor, and host operating system from accessing plaintext data during processing.
- Jurisdiction enforcement through infrastructure. Region restrictions are not merely contractual promises - they are enforced through infrastructure-as-code policies, cloud organisation policies, or network-level controls that technically prevent workloads from running in non-approved regions. Violations trigger alerts.
- Organisation-controlled audit logging. All data access events, including provider administrative access, are logged and forwarded to logging infrastructure that the organisation controls. This may be a dedicated cloud account, an on-premises SIEM, or a third-party log management service under the organisation's contract.
- BYOK/HYOK for processing. Encryption keys used during processing are managed by the organisation, not the provider. The organisation can revoke key access to immediately terminate the provider's ability to process data. This provides a technical kill switch that does not depend on provider cooperation.
Why this matters
Level 3 represents a qualitative shift in the sovereignty posture. At Levels 0-2, the organisation relies on the provider to honour processing constraints - whether through default behaviour, contractual commitment, or compliance certification. At Level 3, technical controls make many violations structurally impossible.
A provider engineer cannot read data processed within a TEE, because the hardware prevents it. A misconfigured deployment cannot process data in a restricted jurisdiction, because infrastructure policies block it. An unauthorised data access cannot go undetected, because audit logs capture it independently.
When Level 3 is warranted
Level 3 is appropriate for organisations processing sensitive personal data at scale, financial services subject to DORA, critical infrastructure under NIS2, and healthcare or legal services handling confidential records. It is also warranted when the organisation's CLOUD Act risk assessment identifies provider access to data during processing as a significant exposure that contractual controls cannot adequately mitigate.
When Level 3 is excessive
For general business workloads where Level 2 contractual controls are proportionate to the data's sensitivity, the additional cost and complexity of confidential computing and BYOK/HYOK may not be justified. TEE deployment requires workload re-architecture and ongoing attestation management. Organisations should assess whether the residual risk at Level 2 is acceptable before committing to the operational overhead of Level 3.
Sovereignty implications
Processing sovereignty at Level 3 is substantial but not absolute. The organisation controls what happens to data during processing and can verify that controls are functioning. However, it still relies on the provider's hardware, firmware, and silicon supply chain. TEE guarantees are only as strong as the underlying hardware implementation - vulnerabilities in CPU architectures (as demonstrated by Spectre, Meltdown, and subsequent attacks) can potentially undermine enclave security.
For most organisations, Level 3 represents the optimal balance between sovereignty and operational efficiency. The residual risks are real but require sophisticated, targeted attacks to exploit, and they are actively addressed by hardware vendors and the security research community.
L4 Autonomous
Self-hosted processing infrastructure with full hardware and software stack control, zero provider access during processing, and air-gapped options for the most sensitive workloads
Criteria
PROC-L4-C1All data processing occurs on infrastructure owned or exclusively leased by the organisation - no shared cloud provider resources are involved in processing sensitive dataEvidence guidance
Review infrastructure inventory and hosting contracts; verify that processing hardware is exclusively allocated; confirm no fallback to shared cloud infrastructure exists
PROC-L4-C2Zero provider access during processing is enforced - no external vendor, cloud provider, or third-party support personnel can access the processing environment without the organisation's explicit, audited authorisationEvidence guidance
Review access control policies and network architecture; verify that remote access by vendors is disabled by default; audit access logs for any third-party access events
PROC-L4-C3Air-gapped processing environments are available for the most sensitive workloads, with physical network isolation preventing any data exfiltration during computationEvidence guidance
Inspect network architecture for air-gapped segments; verify physical isolation (no network interfaces, disabled wireless, controlled USB ports); review data transfer procedures for air-gapped environments
PROC-L4-C4The organisation controls the full processing stack - hardware procurement, firmware, operating systems, runtime environments, and application code - with supply-chain verification at each layerEvidence guidance
Review hardware procurement procedures for supply-chain integrity; verify firmware signing and validation; audit OS and runtime build pipelines for reproducibility and integrity checks
Indicators
- All processing hardware is physically located in organisation-controlled facilities with verified physical security
- Network architecture diagrams confirm air-gapped segments for classified or highly sensitive workloads
- Hardware procurement includes supply-chain verification - tamper-evident shipping, vendor background checks, and firmware integrity validation
- No third-party remote access tools or support channels are active on processing infrastructure
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-5, art-32 | minimal | Full infrastructure control and air-gapped processing exceed Art 32 state-of-the-art requirements and provide maximum assurance for Art 5 integrity and confidentiality principles |
NDSG | art-9 | minimal | On-premises processing within Swiss territory eliminates cross-border transfer concerns under Art 9 nDSG entirely |
NIS2 | art-21 | minimal | Full stack control and air-gapped options exceed NIS2 Art 21 requirements for supply-chain security and risk management |
DORA | art-28, art-30 | minimal | Elimination of ICT third-party dependencies for processing removes the risk categories addressed by DORA Art 28-30 |
Risk if stagnant
Level 4 represents maximum processing sovereignty. The primary risk is operational: maintaining this level requires significant investment in hardware, facilities, and specialised staff. Organisations must balance sovereignty with operational sustainability, ensuring they can recruit and retain the talent needed to operate and secure self-hosted processing infrastructure indefinitely.
Typical characteristics
- Self-hosted infrastructure. Processing runs on hardware the organisation owns outright or leases on an exclusively dedicated basis. This includes servers, storage, networking equipment, and supporting infrastructure (power, cooling, physical security). No shared cloud resources are involved.
- Zero provider access. No external entity - cloud provider, hardware vendor, managed service provider, or support contractor - can access the processing environment during operation. Remote access tools are disabled. Vendor support, when needed, occurs under supervised conditions with full audit logging and explicit authorisation.
- Air-gapped environments. The most sensitive workloads run on physically isolated networks with no connection to the internet or any external network. Data ingress and egress occur through controlled, audited transfer procedures (e.g., physically carried media with integrity verification).
- Full stack control. The organisation manages the entire processing stack from hardware procurement through application deployment. Hardware sourcing includes supply-chain integrity measures. Firmware is validated against known-good signatures. Operating systems and runtimes may be built from source with reproducible build pipelines.
Why this matters
Level 4 eliminates the trust dependency on external providers that exists at every other level. At Level 3, the organisation trusts the provider's hardware and firmware integrity. At Level 4, the organisation verifies or controls these layers directly. This is the only level at which the organisation can make absolute claims about processing sovereignty.
This level is typically required for processing classified government data, defence-related workloads, critical national infrastructure systems, and other scenarios where any external access - even theoretical - is unacceptable.
Sovereignty implications
Processing sovereignty at Level 4 is complete. The organisation controls every aspect of the processing environment, from the silicon to the application layer. No external entity can access, observe, or influence data processing without the organisation's knowledge and explicit consent.
The trade-off is significant operational complexity and cost. The organisation must maintain data centre facilities, procure and manage hardware, build and operate infrastructure software, and employ specialised staff across all these domains. Many organisations will find that Level 3 provides sufficient sovereignty for their risk profile, reserving Level 4 for a subset of their most sensitive workloads.
When Level 4 is warranted
Level 4 is required for classified government data, defence-related workloads, critical national infrastructure, and other scenarios where any external access to the processing environment is unacceptable. It is also warranted when the organisation needs to demonstrate to regulators or clients that no third party can observe or influence data processing under any circumstances.
When Level 4 is excessive
For most commercial organisations, Level 3 provides verifiable technical controls sufficient for regulated sectors. Level 4's total cost of ownership is substantially higher than cloud-based processing, and the organisation bears full responsibility for availability, resilience, hardware lifecycle management, and staffing. Level 4 should be reserved for workloads where the threat model specifically requires elimination of all external provider dependencies.
Operational considerations
Organisations at Level 4 must invest in capabilities that cloud providers typically abstract away: hardware lifecycle management, firmware patching, capacity planning, physical security, power and cooling redundancy, and disaster recovery for self-hosted infrastructure. The total cost of ownership is substantially higher than cloud-based processing, and the organisation bears full responsibility for availability and resilience.