Network Infrastructure complete
Control over network topology, DNS, CDN, and connectivity infrastructure
L0 Unaware
No awareness of network infrastructure dependencies; DNS, CDN, and connectivity are unmanaged or entirely delegated without oversight
Criteria
NET-L0-C1The organisation has no inventory of its DNS providers, CDN services, or network dependenciesEvidence guidance
Request documentation of DNS registrars, nameserver providers, CDN services, and ISP contracts; verify whether a network dependency register exists in any form (spreadsheet, CMDB, wiki)
NET-L0-C2The organisation has no understanding of which external parties can modify its network configuration - routing, DNS, or firewall changes could be made by providers without the organisation's awarenessEvidence guidance
Ask who can make changes to DNS records, firewall rules, or routing configuration; determine whether the organisation would know if a provider made unilateral changes to its network setup
NET-L0-C3DNS domain registrations and critical network accounts are tied to individual employee credentials rather than organisational accounts with role-based accessEvidence guidance
Audit DNS registrar account ownership, CDN console access, and ISP portal credentials; check whether accounts are registered under personal email addresses or shared credentials
Indicators
- DNS registrations are tied to individual employee accounts rather than organisational accounts
- No one in the organisation can describe the full network path from end-user to application
- Network incidents are discovered through customer complaints rather than monitoring
- No record exists of which CDN or DNS provider serves which domain
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-5, art-32 | critical | Unmanaged network infrastructure cannot satisfy the integrity and confidentiality principles (Art 5(1)(f)) or the obligation to implement appropriate technical measures (Art 32). Network logs containing IP addresses constitute personal data under CJEU C-582/14 (Breyer) yet are not governed. |
NDSG | art-8 | high | Failure to maintain visibility over network infrastructure violates the requirement to ensure data security through appropriate technical and organisational measures (Art 8 nDSG) |
NIS2 | art-21 | critical | NIS2 Art 21(2) requires risk analysis and information system security policies. Complete absence of network awareness makes compliance with any of the enumerated measures impossible. |
Upgrade path
Create an inventory of all DNS, CDN, and connectivity providers. Document the current network topology and assign organisational ownership to all network accounts. Establish a basic monitoring system that alerts on DNS resolution failures and connectivity outages.
Risk if stagnant
Without visibility into network infrastructure, the organisation cannot detect routing anomalies, DNS hijacking, or CDN misconfigurations. A single provider outage or account compromise could sever all connectivity with no recovery plan. If a key employee leaves, access to critical DNS or hosting accounts may be permanently lost.
Typical characteristics
- No asset inventory. The organisation has no central record of which DNS registrars, nameserver providers, CDN services, or ISPs it depends on. Different teams may use different providers without coordination, and no one holds a complete picture of the network dependency chain.
- Individual account ownership. Domain registrations, CDN dashboards, and ISP management portals are logged in under personal employee email addresses. If that employee leaves, the organisation may lose the ability to manage its own domains or network configuration.
- No change management. Firewall rules, DNS records, and CDN configurations are modified directly in provider consoles without review, approval, or documentation. There is no audit trail of who changed what and when.
- Reactive incident discovery. Network problems are discovered when users or customers report them, not through monitoring. The organisation has no alerting for DNS resolution failures, routing changes, or latency degradation.
Why this is dangerous
Network infrastructure is the foundation on which every other digital capability rests. Without visibility into DNS, routing, and connectivity dependencies, the organisation is unable to assess its own attack surface, plan for provider failures, or respond to incidents with any confidence.
DNS hijacking, for instance, can redirect all traffic intended for the organisation to an attacker-controlled server. If the organisation does not even know which nameservers it uses, it cannot detect such an attack, let alone respond to it. Similarly, BGP route leaks can silently redirect traffic through unintended jurisdictions, a risk the organisation cannot evaluate without a documented network topology.
The regulatory exposure is equally severe. Under GDPR, IP addresses constitute personal data (as confirmed by the CJEU in the Breyer ruling). Network logs that contain IP addresses are therefore subject to data protection requirements, yet at Level 0, the organisation has no awareness of where such logs exist or who processes them. NIS2 Art 21 requires essential and important entities to implement baseline cybersecurity measures including risk analysis and incident handling, none of which are possible without basic network awareness.
Sovereignty implications
At this level, network sovereignty is not a meaningful concept. The organisation lacks the foundational visibility required to reason about where its traffic flows, which jurisdictions it transits, or which providers could disrupt its connectivity. Establishing basic inventory and documentation is the prerequisite for any sovereignty consideration.
L1 Dependent
Network infrastructure is fully managed by a single cloud or ISP provider with no organisational control over routing, DNS, or CDN configuration
Criteria
NET-L1-C1All DNS, CDN, and network routing are managed by a single provider with no alternative or failover configurationEvidence guidance
Identify the DNS registrar and nameserver provider; confirm whether a secondary DNS provider or alternative CDN exists. Check for any documented failover or disaster recovery plan for network services.
NET-L1-C2The organisation cannot modify DNS records, firewall rules, or routing policies without going through the provider's support processEvidence guidance
Attempt to identify how DNS changes are made; verify whether the organisation has API or console access, or whether all changes require a support ticket with the provider
NET-L1-C3Network monitoring relies entirely on the provider's built-in dashboards with no independent verification of availability or performanceEvidence guidance
Review monitoring tools in use; confirm whether any external or self-hosted monitoring (e.g., uptime checks, synthetic tests) exists independently of the primary network provider
Indicators
- DNS is managed entirely through the hosting provider's default nameservers
- Network outages are resolved exclusively by waiting for the provider to act
- The organisation uses a US-based CDN (e.g., Cloudflare, AWS CloudFront) as its sole content delivery and DDoS protection layer
- No independent network monitoring or synthetic availability testing is in place
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-5, art-28, art-32 | high | Full dependency on a single network provider without data processing agreements or transparency into data flows risks non-compliance with Art 28 processor obligations and Art 32 security measures. Traffic may transit jurisdictions without adequate protection. |
NIS2 | art-21 | high | Single-provider dependency without failover conflicts with NIS2 Art 21(2)(c) business continuity requirements and Art 21(2)(d) supply-chain security mandates |
CLOUD-ACT | 18-usc-2703 | high | If the sole network provider is US-headquartered (e.g., Cloudflare, AWS, Google Cloud), all DNS queries, CDN traffic, and network metadata are subject to CLOUD Act compelled disclosure regardless of data storage location |
DORA | art-9 | high | For financial entities, single-provider network dependency constitutes ICT concentration risk under DORA Art 9, requiring explicit assessment and mitigation |
Upgrade path
Negotiate contractual controls over DNS management and CDN configuration. Establish SLAs for network availability and incident response times. Begin migrating DNS to a provider that offers API-based management. Deploy independent uptime monitoring to verify provider performance claims.
Risk if stagnant
Complete dependency on a single network provider means any provider outage, policy change, or commercial dispute can take the organisation entirely offline. If the provider is US-headquartered, CLOUD Act and FISA Section 702 exposure means network metadata and potentially traffic content could be disclosed to foreign authorities without the organisation's knowledge. The organisation has no leverage to demand performance improvements, geographic routing preferences, or jurisdictional guarantees.
Typical characteristics
- Single-provider dependency. All DNS resolution, CDN distribution, DDoS protection, and often firewall management are handled by one provider. The organisation's entire internet presence depends on this single relationship continuing without disruption.
- No self-service capability. DNS record changes, firewall rule modifications, and CDN cache purges require submitting a support request to the provider. Response times depend on the provider's support tier, and the organisation cannot act independently during incidents.
- Opaque traffic routing. The organisation has no insight into where its traffic is routed geographically. User requests may transit through data centres in jurisdictions the organisation has not evaluated, including countries with expansive surveillance powers.
- Provider-dependent monitoring. Any visibility into network health comes exclusively through the provider's own dashboards. The organisation cannot independently verify uptime claims, latency metrics, or the provider's incident response accuracy.
Why this matters for sovereignty
Network infrastructure at Level 1 functions as a black box. The provider decides which nameservers resolve the organisation's domains, which edge locations serve its content, and which upstream networks carry its traffic. These decisions have direct sovereignty implications that the organisation cannot evaluate, let alone control.
When the network provider is a US-headquartered company, the CLOUD Act grants American law enforcement the authority to compel disclosure of data held by that provider, regardless of where the data is stored or where the traffic flows. For CDN providers specifically, this is significant because CDN edge nodes terminate TLS connections and can inspect traffic in cleartext. A US CDN provider serving European user traffic can, in principle, be compelled to provide access to that traffic content.
FISA Section 702 extends this further by authorising warrantless surveillance of non-US persons' communications for foreign intelligence purposes. If the organisation's CDN or DNS provider is subject to FISA obligations, European user data passing through that provider's infrastructure is within scope.
Common misconceptions
- "Our data is in Europe, so it is safe." Data residency for storage does not address network transit. If DNS queries resolve through US nameservers or traffic flows through a US CDN's edge nodes, the data is subject to US jurisdiction during transit regardless of where it is stored at rest.
- "The provider guarantees 99.9% uptime." Uptime guarantees in standard terms of service are typically backed by service credits, not by any obligation to maintain connectivity. A provider can meet its SLA obligations financially while the organisation suffers an outage it cannot resolve independently.
- "We can switch providers if needed." Without documented configurations, API access, or portable DNS zone files, migrating away from a single provider is far more disruptive and time-consuming than organisations typically anticipate.
Sovereignty implications
At Level 1, the organisation has delegated its network sovereignty entirely to a third party. It cannot choose where its traffic flows, cannot verify the provider's security posture independently, and cannot respond to network incidents without the provider's cooperation. The organisation has no independent capability to operate, reconfigure, or recover its network presence.
L2 Contractual
Network infrastructure controls are defined through contracts and SLAs with providers, including DNS management rights, CDN configuration authority, and data-residency commitments for network metadata
Criteria
NET-L2-C1The organisation has contractual authority to manage its own DNS records and CDN caching policies through provider-supplied tooling, including API access for programmatic managementEvidence guidance
Confirm API or console access to DNS and CDN management; verify that the contract grants the organisation self-service capability for record changes, cache purges, and configuration updates without requiring provider intervention
NET-L2-C2Data Processing Agreements are in place with all network providers that specify the jurisdictional scope of network metadata processing, including DNS query logs, CDN access logs, and traffic analyticsEvidence guidance
Review signed DPAs for DNS, CDN, and ISP providers; confirm that they address the processing of network metadata (IP addresses, query logs, access logs) and specify geographic restrictions on where this data is processed and stored
NET-L2-C3Network access logs, DNS query logs, and firewall logs are exported to an organisation-controlled log management systemEvidence guidance
Verify that CDN access logs, DNS query logs, and firewall logs are forwarded to an organisation-controlled SIEM or log management platform rather than retained solely in the provider's console
NET-L2-C4Log retention periods for all network metadata meet applicable regulatory requirementsEvidence guidance
Confirm that retention policies for network logs exceed the provider's default and satisfy applicable regulatory requirements (typically 12+ months); verify that retention is enforced through automated lifecycle policies
Indicators
- DNS changes can be made by the organisation directly through an API or control panel
- SLA reports are reviewed regularly and provider performance is tracked against contractual commitments
- Signed DPAs exist for all providers that handle network metadata, specifying EU or Swiss data residency
- Network access logs appear in the organisation's own log management system, not solely in the provider's console
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-5, art-28, art-32 | medium | DPAs with network providers address Art 28 processor obligations. Contractual data-residency commitments support Art 5 transfer requirements. However, enforcement depends on provider compliance, and contractual restrictions do not override compelled disclosure under foreign law. |
NDSG | art-7, art-8 | medium | DPAs and data-residency clauses support Art 8 security requirements; documented processing activities enable Art 7 transparency obligations for network metadata |
NIS2 | art-21 | medium | SLAs and contractual controls satisfy NIS2 Art 21(2)(d) supply-chain security requirements at a basic level, but single-provider dependency without technical failover remains a residual risk |
DORA | art-9 | medium | Contractual ICT third-party risk management meets DORA Art 9 requirements at a documented level; however, operational resilience testing must verify that contractual protections translate to actual availability |
CLOUD-ACT | 18-usc-2703 | medium | Contractual restrictions do not override compelled disclosure under the CLOUD Act. DPA clauses requiring notification of government access requests provide early warning but cannot prevent disclosure. |
Upgrade path
Deploy a secondary DNS provider for redundancy. Implement self-managed firewall rules and begin operating organisation-controlled reverse proxies or edge nodes for critical services. Evaluate European CDN alternatives to reduce jurisdictional risk from US-headquartered providers.
Risk if stagnant
Contractual controls provide legal recourse but not operational independence. If the provider fails to meet SLAs, the organisation can seek compensation but still suffers the outage. Contractual data-residency commitments can be overridden by foreign government orders (CLOUD Act, FISA Section 702), leaving the organisation with a legal remedy but no technical protection. True resilience requires self-managed alternatives.
Typical characteristics
- Negotiated SLAs. The organisation has moved beyond default terms of service to negotiate specific availability targets, latency guarantees, and incident response commitments. Financial penalties or termination rights are defined for SLA breaches.
- Self-service DNS and CDN management. The organisation can create, modify, and delete DNS records and CDN configurations through an API or management console without requiring provider support tickets. This enables faster incident response and routine operational agility.
- Data Processing Agreements for network metadata. DPAs with DNS, CDN, and ISP providers explicitly address the processing of network metadata. IP addresses, DNS query logs, and CDN access logs are recognised as personal data (per CJEU C-582/14), and the DPAs specify jurisdictional restrictions on where this data is processed.
- Independent log retention. Network access logs and DNS query logs are exported to an organisation-controlled system. This ensures that the organisation retains visibility into network events independently of the provider's retention policies and access controls.
The contractual gap
The core limitation of Level 2 is the same across all dimensions: contractual obligations are only as strong as the enforcement mechanisms behind them. For network infrastructure, this gap manifests in several specific ways:
- Jurisdictional override. The CLOUD Act explicitly allows US authorities to compel US-headquartered providers to disclose data regardless of contractual data-residency restrictions. A DPA that specifies EU-only processing does not prevent a US provider from complying with a lawful US government order. The provider faces conflicting legal obligations, and US law typically prevails for US-incorporated entities.
- Traffic interception capability. CDN providers terminate TLS connections at their edge nodes, meaning they can inspect traffic in cleartext. A contractual promise not to inspect traffic does not eliminate the technical capability to do so, nor does it prevent compelled inspection under a court order.
- DNS resolution transparency. Even with API-based DNS management, the authoritative nameservers themselves are operated by the provider. The organisation controls the content of DNS records but not the resolution infrastructure that serves them. A provider-side compromise or government order affecting the nameserver infrastructure is outside the organisation's contractual reach.
- SLA enforcement asymmetry. When a network provider breaches its SLA, the organisation's recourse is typically limited to service credits or contract termination. Neither remedy addresses the immediate operational impact of a network outage. For organisations that depend on continuous connectivity, the financial remedy is far less valuable than the connectivity that was lost.
When Level 2 is appropriate
Level 2 is a reasonable posture for organisations that:
- Operate in regulatory environments where contractual safeguards are accepted as valid risk mitigation (noting that this acceptance may be challenged by future regulatory guidance or court rulings)
- Do not process highly sensitive data through their CDN or DNS infrastructure
- Have the operational capacity to monitor provider compliance but not yet the capability to operate self-managed network infrastructure
- Are actively evaluating the path to Level 3, with a credible migration plan that can be triggered if the risk posture changes
Sovereignty implications
At Level 2, the organisation has established a contractual framework for network sovereignty but lacks technical enforcement. It controls what DNS records exist and how CDN caching behaves, but it does not control the infrastructure that serves those records or delivers that content. The provider remains a trusted intermediary whose cooperation is assumed, not verified.
L3 Controlled
The organisation self-manages critical network components including DNS, firewalls, and CDN edge nodes, with multi-provider redundancy and infrastructure-as-code governance
Criteria
NET-L3-C1DNS is managed through organisation-controlled authoritative nameservers with automated failover to a secondary DNS providerEvidence guidance
Inspect the authoritative DNS infrastructure; confirm that the organisation operates its own nameservers (e.g., PowerDNS, Knot DNS, BIND) or controls the configuration of a dedicated DNS provider. Verify automated failover through DNS health checks and secondary provider configuration.
NET-L3-C2DNSSEC is deployed and validated on all organisational domainsEvidence guidance
Confirm DNSSEC signing is active on all authoritative zones; verify that DNSSEC validation succeeds using external validation tools (e.g., DNSViz, Verisign DNSSEC Debugger). Check that DS records are published in parent zones.
NET-L3-C3CDN and DDoS mitigation services are provided by European-headquartered providers or self-managed edge infrastructure, eliminating US-jurisdictional exposure for content deliveryEvidence guidance
Identify all CDN and DDoS mitigation providers; confirm their legal incorporation jurisdiction. If self-managed, verify the geographic distribution and capacity of edge nodes. Acceptable European providers include those headquartered and incorporated in EU/EEA or Swiss jurisdictions.
Indicators
- DNS zone files are version-controlled and deployed through CI/CD pipelines
- Network monitoring detects and alerts on routing anomalies, latency spikes, and DNS resolution failures within minutes
- DNSSEC is deployed and validated on all organisational domains
- CDN traffic is served through European-headquartered providers or self-managed edge nodes
- Firewall and reverse proxy configurations are managed as code with full audit trail
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-25, art-32 | low | Self-managed network infrastructure supports data-protection-by-design (Art 25) and enables the organisation to implement technical measures commensurate with risk (Art 32). European CDN providers eliminate cross-border transfer concerns for traffic data. |
NDSG | art-7, art-8 | low | Full control over DNS and CDN infrastructure satisfies Art 8 data-security requirements; the organisation can provide transparent processing information as required by Art 7 because it controls the entire data flow. |
NIS2 | art-21 | low | Self-managed DNS with failover, infrastructure-as-code governance, and independent monitoring comprehensively address NIS2 Art 21 requirements for risk management, incident handling, business continuity, and supply-chain security |
DORA | art-9 | low | Multi-provider redundancy and self-managed critical components reduce ICT concentration risk. Infrastructure-as-code enables the operational resilience testing and scenario analysis required by DORA. |
CLOUD-ACT | 18-usc-2703 | low | Using European-headquartered CDN and DNS providers for self-managed infrastructure avoids direct CLOUD Act exposure. Residual risk exists only through upstream transit providers. |
Upgrade path
Pursue own AS number and IP address space through RIPE NCC membership. Evaluate running sovereign DNS resolvers (recursive) alongside the existing authoritative infrastructure. Establish private peering arrangements at European IXPs (DE-CIX, SwissIX, AMS-IX) with critical service providers and upstream transit networks.
Risk if stagnant
While self-managed components reduce provider dependency significantly, the organisation still relies on upstream transit providers for internet connectivity and cannot control routing at the BGP level. Without its own AS number and IP space, the organisation cannot implement RPKI/ROA to protect against BGP hijacking, and sophisticated network-level attacks or routing manipulation remain difficult to mitigate.
Key capabilities at this level
- Self-managed authoritative DNS. The organisation runs its own authoritative nameservers (PowerDNS, Knot DNS, BIND, or equivalent) with DNSSEC signing enabled on all domains. A secondary DNS provider is configured for automated failover, ensuring that a single nameserver failure does not disrupt resolution. DNS zone files are managed as code, enabling audit trails and rollback.
- Infrastructure-as-code governance. Firewall rules, reverse proxy configurations, and CDN caching policies are defined declaratively in version-controlled repositories. Changes are deployed through CI/CD pipelines with mandatory peer review. This eliminates ad-hoc configuration changes and provides a complete audit trail of network infrastructure modifications.
- Independent network monitoring. The organisation operates its own monitoring stack (Prometheus, Grafana, Zabbix, or equivalent) that independently verifies DNS resolution, measures latency, detects routing anomalies, and monitors certificate transparency logs. Alerts trigger defined incident response procedures with on-call rotations.
- European CDN and DDoS mitigation. Content delivery and DDoS protection are provided by European-headquartered companies (such as Myra Security, Bunny.net, KeyCDN, or Gcore) or through self-managed edge infrastructure. This eliminates the CLOUD Act and FISA Section 702 exposure inherent in US-headquartered CDN providers.
Operational considerations
Self-managed network infrastructure demands operational maturity comparable to that required for self-managed identity (DSCM-IAM Level 3):
- DNS as a Tier-0 service. If authoritative DNS fails, no one can reach the organisation's services. Clustering, geographic distribution, and tested failover procedures are essential. DNSSEC key rotation must be managed carefully to avoid validation failures.
- Infrastructure-as-code discipline. The value of IaC depends entirely on the discipline to use it consistently. If engineers bypass the pipeline and make changes directly in provider consoles, the code repository drifts from reality, and the audit trail becomes unreliable.
- Monitoring coverage. Network monitoring must cover not only the organisation's own infrastructure but also upstream provider behaviour. BGP route monitoring (through services like RIPE RIS or BGPStream) provides early warning of routing anomalies that could indicate hijacking or route leaks.
- European CDN evaluation. European CDN providers offer strong sovereignty positioning but may have fewer edge locations and lower total capacity than US hyperscalers. The organisation must evaluate whether the performance characteristics of European alternatives meet its requirements for all geographic markets.
Real-world context
The importance of DNS and routing sovereignty is not theoretical. In June 2019, Swiss data centre company SafeHost (AS21217) leaked over 70,000 routes to China Telecom (AS4134), causing European traffic from networks including Swisscom and KPN to be rerouted through China for over two hours. Organisations without independent routing monitoring had no visibility into this incident until it was reported publicly. At Level 3, the organisation's monitoring stack would detect such anomalies, even if it cannot yet prevent them at the BGP level.
Sovereignty posture
At Level 3 the organisation has achieved substantive network sovereignty. It controls its DNS infrastructure, governs its network configuration through code, monitors its connectivity independently, and avoids jurisdictional exposure through US network intermediaries. The primary remaining gap is at the routing layer: without its own AS number and IP address space, the organisation cannot participate directly in BGP routing and remains dependent on upstream transit providers for connectivity.
L4 Autonomous
Fully sovereign network infrastructure with own AS number, IP space, BGP peering at European IXPs, self-hosted DNS (authoritative and recursive), and organisation-operated DDoS mitigation with no single external dependency
Criteria
NET-L4-C1The organisation holds its own AS number and provider-independent IP address allocations through RIPE NCC, with RPKI Route Origin Authorisations published for all announced prefixesEvidence guidance
Verify the organisation's ASN and IP allocations in the RIPE database. Check that RPKI Route Origin Authorisations (ROAs) are published for all announced prefixes. Verify the organisation appears in public BGP routing tables under its own ASN.
NET-L4-C2BGP peering is established at multiple European internet exchange pointsEvidence guidance
Confirm BGP peering sessions at two or more European IXPs (e.g., DE-CIX, SwissIX, AMS-IX). Verify active session status and review peering agreements. Check that the organisation maintains both public peering (route servers) and private peering with critical partners.
NET-L4-C3All DNS infrastructure, both authoritative nameservers and recursive resolvers, is operated on organisation-controlled hardware within a known legal jurisdiction, with DNSSEC fully deployed and validatedEvidence guidance
Audit the complete DNS stack; confirm that authoritative nameservers and recursive resolvers run on organisation-owned or exclusively leased infrastructure. Verify DNSSEC signing (authoritative) and validation (recursive). Confirm that no external recursive resolver (e.g., Google 8.8.8.8, Cloudflare 1.1.1.1) is used as a fallback for organisational systems.
NET-L4-C4DDoS mitigation is operated on organisation-controlled infrastructure using BGP-based techniques (RTBH, flowspec) or organisation-managed scrubbing capacity, with no dependency on a single external mitigation providerEvidence guidance
Review DDoS mitigation architecture; confirm the organisation can implement BGP Remotely Triggered Black Hole (RTBH) routing and/or BGP flowspec rules at its IXP peers. If scrubbing centres are used, verify they are European-operated and that the organisation maintains independent mitigation capability.
NET-L4-C5The organisation maintains internal network connectivity and critical service availability during a complete loss of external internet connectivityEvidence guidance
Request documentation of network isolation testing; confirm that internal DNS resolution, authentication, and critical application access function when external connectivity is severed. Verify that an isolation test has been conducted within the past 12 months.
Indicators
- The organisation appears in public BGP routing tables under its own ASN with RPKI ROAs published for all announced prefixes
- Sovereign DNS resolvers (both authoritative and recursive) serve all organisational domains with DNSSEC fully deployed and validated
- The organisation maintains active BGP peering sessions at two or more European IXPs
- An annual network isolation test confirms that internal services remain operational without external internet connectivity
- DDoS mitigation capability is demonstrated through documented RTBH or flowspec procedures, tested at least annually
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-5, art-25, art-32 | minimal | Full self-hosting of network infrastructure eliminates cross-border transfer risks for network metadata. Data-protection-by-design (Art 25) and security measures (Art 32) are entirely within organisational control. No third-party processor handles DNS queries or traffic data. |
NDSG | art-7, art-8 | minimal | Complete control over network infrastructure fully satisfies Art 8 security requirements and enables comprehensive Art 7 transparency, as the organisation can account for every network data flow. |
NIS2 | art-21 | minimal | Elimination of third-party network dependencies removes supply-chain risk (Art 21(2)(d)). Self-managed DNS, BGP, and DDoS mitigation exceed Art 21 requirements for network and information system security. The organisation satisfies the DNS-specific obligations of NIS2 Art 28 through self-operation. |
DORA | art-9 | minimal | No ICT third-party concentration risk for network services. The organisation's network infrastructure supports the operational resilience testing and threat-led penetration testing (TLPT) required by DORA. |
CLOUD-ACT | 18-usc-2703 | minimal | No US-jurisdictional provider has access to or control over network infrastructure. CLOUD Act and FISA Section 702 compelled disclosure are not applicable to any component of the network plane. |
Risk if stagnant
Level 4 represents the maximum network sovereignty posture, but it carries the highest operational burden. Maintaining an autonomous system requires dedicated network engineering staff with BGP, DNSSEC, and IXP peering expertise. Without sustained investment, RPKI certificates may expire, peering sessions may lapse, and DNSSEC key rollovers may fail, potentially causing more disruption than a well-managed provider relationship would. Autonomy without operational excellence is a liability, not an asset.
What defines Level 4
The distinguishing characteristic of Level 4 is zero single-point-of-failure dependency on any external network provider. This goes beyond self-managing DNS and CDN (Level 3) to encompass the routing layer itself:
- Own Autonomous System. The organisation holds its own ASN and provider-independent IP address space through RIPE NCC. It participates directly in BGP routing, announcing its prefixes to multiple upstream providers and IXP peers. This means the organisation is a recognised, independent participant in global internet routing rather than a customer of someone else's network.
- IXP peering. The organisation peers at multiple European internet exchange points (DE-CIX, SwissIX, AMS-IX, or equivalent). Public peering via route servers provides connectivity to hundreds of networks through a single physical connection, while private peering arrangements with critical partners provide guaranteed bandwidth and lower latency for high-volume traffic relationships.
- Sovereign DNS (authoritative and recursive). Beyond operating authoritative nameservers (Level 3), the organisation also runs its own recursive DNS resolvers for internal use. This eliminates the dependency on external resolvers (Google, Cloudflare, or ISP-provided) that could log queries, inject responses, or be subject to foreign government surveillance.
- Self-managed DDoS mitigation. The organisation can defend against volumetric attacks using BGP-based techniques. Remotely Triggered Black Hole (RTBH) routing drops attack traffic at the network edge, while BGP flowspec rules enable more granular filtering. For application-layer attacks, the organisation operates its own scrubbing infrastructure or contracts with European-operated scrubbing providers as a complement to its own capabilities.
RPKI and BGP security
Holding an ASN brings with it the responsibility to secure the organisation's routing announcements. Resource Public Key Infrastructure (RPKI) with Route Origin Authorisations (ROAs) is the primary defence against BGP hijacking, where a malicious or misconfigured network announces the organisation's IP prefixes as its own.
The organisation publishes ROAs for all announced prefixes through the RIPE NCC portal, cryptographically binding its IP ranges to its ASN. This enables other networks that implement Route Origin Validation (ROV) to reject unauthorised announcements of the organisation's prefixes. While global ROV adoption remains incomplete (approximately 40% of globally routed prefix-AS pairs are covered), the trend is toward universal adoption, and publishing ROAs is a low-cost measure with significant protective value.
BGP hijacking is not a theoretical risk. In June 2019, over 70,000 routes were leaked through China Telecom (AS4134) due to a misconfiguration at Swiss data centre company SafeHost, rerouting European traffic from Swisscom, KPN, and other networks through China for over two hours. In June 2024, Cloudflare's 1.1.1.1 DNS resolver was hijacked by a Brazilian ISP, affecting 300 networks across 70 countries. At Level 4, the organisation's RPKI deployment and direct IXP presence provide both protection and rapid detection capabilities against such incidents.
European IXP landscape
European internet exchange points are predominantly operated as non-profit associations governed by their member networks. This governance model ensures that internet traffic exchange within Europe remains under European collective governance:
- DE-CIX Frankfurt is the world's largest internet exchange by connected networks, with over 1,100 connected networks and peak traffic exceeding 25 Tbps. It operates as an independent GmbH.
- SwissIX is Switzerland's primary IXP, operating across five sites (Basel, Bern, Glattbrugg, Lupfig, Zurich) with 229 members. Traffic grew 28% in 2025 alone, and the exchange is upgrading core sites to 400G capacity.
- AMS-IX in Amsterdam operates as a non-profit association with over 900 connected networks.
Peering at these exchanges provides the organisation with direct, low-latency connectivity to European networks without routing traffic through US-jurisdictional intermediaries.
Operational reality
Level 4 demands the highest level of internal network engineering capability:
- Dedicated network engineering team. The organisation needs staff with deep expertise in BGP operations, DNSSEC key management, IXP peering, and DDoS mitigation. This is typically a team of 2-4 network engineers for a mid-sized organisation, plus on-call coverage for routing incidents.
- RIPE NCC membership. Holding IP resources and an ASN through RIPE NCC requires maintaining a Local Internet Registry (LIR) membership, paying annual fees, and complying with RIPE policies for resource usage and registration data accuracy.
- Continuous BGP monitoring. The organisation must monitor its own routing announcements and the global routing table for anomalies affecting its prefixes. Tools like RIPE RIS, BGPStream, and MANRS (Mutually Agreed Norms for Routing Security) provide visibility into the global routing ecosystem.
- DNSSEC key lifecycle management. Operating both authoritative and recursive DNS with DNSSEC requires managing key signing keys (KSKs) and zone signing keys (ZSKs), performing regular key rollovers, and monitoring DNSSEC validation across the recursive resolver fleet.
- Network isolation testing. Annual testing confirms that internal services continue to function when external connectivity is severed, similar to the identity isolation test at DSCM-IAM Level 4.
When Level 4 is warranted
Full network autonomy is appropriate for organisations that:
- Operate critical infrastructure or process sovereignty-sensitive data where any external network dependency is unacceptable
- Serve as network service providers themselves, where BGP autonomy is a business requirement
- Face specific state-level threats to network integrity, such as traffic interception, DNS manipulation, or routing-based censorship
- Have the engineering talent and operational maturity to sustain autonomous network operations at the required level of reliability
When Level 4 is excessive
For many organisations, Level 3 (Controlled) provides sufficient network sovereignty with substantially lower operational complexity. The cost of maintaining an ASN, managing BGP peering relationships, and operating sovereign recursive DNS resolvers is significant. Organisations should pursue Level 4 only when their threat model and regulatory requirements explicitly demand routing-layer independence, and when they can sustain the required operational investment over the long term.
Sovereignty posture
At Level 4 the organisation has no single external network dependency. It controls its own routing through BGP, resolves DNS through its own servers, and mitigates attacks using its own infrastructure. No foreign government can compel a network intermediary to intercept the organisation's traffic, because the organisation is itself the network operator. Its network sovereignty is limited only by the fundamental architecture of the internet (shared physical cables, root DNS governance) and its own operational competence.