Sovereignty is no longer about location

By Leonardo Boscaro, EMEA Sales Leader, Nutanix Database.

Sovereignty has become one of the most frequently used terms in European technology conversations, yet it is often defined too narrowly. For some, it still means data residency. For others, it means hosting in a sovereign cloud region. In practice, neither definition is sufficient.

Across Europe, regulatory frameworks such as the EU’s Digital Operational Resilience Act are now in force, placing explicit obligations on financial institutions to demonstrate resilience, test critical services and manage third-party dependency risk. The EU Data Act introduces clearer requirements for data portability and provider switching. In parallel, national governments continue to invest in sovereign cloud initiatives, while geopolitical tensions and cross-border data access debates remain part of the strategic landscape.

These developments have changed the nature of the sovereignty conversation. Today’s organisations do not simply ask where data resides. They increasingly ask who controls the operating model, how easily workloads can be moved, and whether operational governance remains consistent if commercial or regulatory conditions change.

Beyond geography

Early sovereignty debates focused primarily on data location. Keeping data within national or regional boundaries was seen as the primary safeguard against external jurisdictional risk. While location remains important, it does not resolve the deeper issue of dependency.

An organisation may run workloads in a sovereign region, yet still be tightly coupled to a single provider’s tooling, lifecycle constructs and operational workflows. In such situations portability exists in theory but becomes difficult in practice. Controls must be rebuilt, recovery processes revalidated, and governance models adjusted each time infrastructure choices evolve.

Many large organisations have responded by building internal automation frameworks designed to run workloads consistently across on-premises and cloud environments. These initiatives can successfully introduce infrastructure portability. However, operational complexity often reappears at the data layer, where database provisioning, patching and recovery processes remain dependent on environment-specific tooling or internally maintained scripts.

True sovereignty requires more than regional hosting or infrastructural abstraction. It requires control of the data operating model itself.

Regulation is redefining dependency

DORA, for example, goes beyond traditional availability metrics. It requires financial institutions to assess and manage concentration risk, including reliance on critical third-party providers. Supervisory authorities are increasingly focused on whether organisations can demonstrate resilience independently of any single infrastructure provider.

Similarly, the EU Data Act introduces measures designed to make switching between cloud providers more feasible over time. While implementation will evolve, the direction is clear: policymakers expect greater flexibility and reduced lock-in.

These frameworks do not instruct organisations to abandon public cloud. They do, however, raise expectations around operational autonomy. Leaders must demonstrate that resilience, governance, and recovery processes are not dependent on proprietary architectures that cannot be replicated elsewhere.

The data operating model as the control point

This is where the conversation moves from infrastructure to operating model. When database provisioning, lifecycle management and recovery are governed through a consistent data operating model, sovereignty becomes operational rather than theoretical. 

Workloads may already move between environments, but sovereignty is tested when data platforms must be recovered, audited or re-deployed under regulatory pressure. If database operations differ across infrastructures, governance must effectively be rebuilt each time environments change.

A consistent database operating model allows organisations to apply lifecycle policies, guardrails and recoverability standards once and enforce them uniformly across on-premises and public cloud environments. Infrastructure becomes a deployment choice rather than a governance constraint.

Without this layer of standardisation, hybrid strategies can increase complexity rather than reduce risk. Dependencies do not disappear; they simply shift from external providers to internally developed automation frameworks that require continuous maintenance and specialised expertise.

Open source without operational sovereignty 

The growing adoption of open-source databases across Europe reflects another important dimension of the sovereignty discussion. Organisations increasingly select open technologies to reduce dependency on proprietary platforms, licensing constraints and provider-specific services.

However, open-source adoption alone does not automatically deliver sovereignty. When each environment requires different provisioning models, upgrade procedures or recovery practices, operational dependency persists. Complexity moves from the provider to internal platform teams responsible for maintaining automation and operational consistency.

For highly mature organisations, internally developed database automation can provide flexibility. For many others, industrialising these capabilities across multiple environments proves difficult to sustain over time.

Sovereignty therefore depends not only on open technology choices, but on the existence of a consistent database operating model capable of delivering lifecycle automation, governance and recoverability out-of-the-box across infrastructures.

Hybrid without fragmentation

Many EMEA organisations will continue to operate in hybrid and multicloud environments. Public cloud delivers elasticity and access to innovation while On-premises environments provide control, proximity and in some cases regulatory assurance. The strategic objective is not to favour one over the other, but to operate coherently across both.

This coherence depends on whether the data operating model travels with the workload. If provisioning, patching and recovery processes differ materially between environments, operational risk increases. When these processes are standardised through a common operational layer, consistency is preserved even as infrastructure evolves.

In this context, sovereignty becomes the ability to adapt without rebuilding governance from scratch. It is the confidence that regulatory scrutiny, commercial renegotiation or geopolitical shifts will not force a complete redesign of database operations.

Commercial and geopolitical resilience

Recent global events have shown how quickly commercial and geopolitical conditions can evolve, with licensing models changing, provider strategies shifting and regulatory expectations tightening as concentration risk becomes an increasing supervisory focus.

Organisations that treat sovereignty purely as a hosting decision may find themselves reacting to these changes. Those who treat sovereignty as operational autonomy are better positioned. By controlling the data operating model, they retain flexibility and can consolidate, migrate or rebalance workloads while preserving consistent governance and recovery discipline.

Independent analysis from Forrester’s Total Economic Impact study supports what many organisations are already recognising in practice. When database operations are standardised within a unified operational layer, resilience improves and operational friction declines. The result is not only efficiency, but greater control over how and where critical services run.

Sovereignty as leadership discipline

For today’s CIOs, CTOs and CISOs, sovereignty ultimately means retaining operational control, regardless of where workloads run. It requires ensuring that governance, recovery and lifecycle management remain consistent even as infrastructure strategies evolve.

In regulated environments, credibility depends on evidence. Leaders must demonstrate that resilience testing, recovery execution and governance controls remain reproducible across infrastructure choices. That consistency is achieved not through geography alone, but through disciplined ownership of the data operating model.

Sovereignty, in this sense, is operational autonomy. It is the ability to make infrastructure decisions without compromising control, compliance or recoverability. 

By Karthik SJ, General Manager of AI at LogicMonitor.
By Fiona Reid, Director of International Business at Pattern
By Paul Speciale, Chief Marketing Officer at Scality.
By Samantha Jennings, Head of Operations, Avella.
By Frédéric Godemel, EVP Energy Management, Schneider Electric.