Episode Details
Back to Episodes
Sovereignty is Not a Product: The Architecture of Control
Published 1 week, 2 days ago
Description
Most organizations treat “sovereign cloud” like something you can buy. Pick a region.
Print the compliance packet.
Call it done. That’s the comfortable lie. In this episode, we dismantle the myth that sovereignty is a SKU, a geography, or a contract clause. Sovereignty is not residency. It’s not a marketing label. It’s not “EU-only” storage. Sovereignty is enforceable authority over:
It does not transfer decision authority. Geography answers where.
Sovereignty answers who. 4️⃣ The CLOUD Act Reality Check Jurisdiction eats geography. If a provider can be compelled, sovereignty depends on one question: Does compelled access produce plaintext — or encrypted noise? That answer lives in your key custody model. 5️⃣ Encryption Without Custody Is Theater Encryption at rest is hygiene.
Customer-managed keys are better.
External custody with controlled release? That’s sovereignty. Because encryption isn’t the point. Who can cause decryption is. 🧠 Identity Is the Compiler of Authority Entra isn’t just an identity provider.
It’s a distributed decision engine that continuously mints tokens — portable authority. If token issuance drifts, your sovereignty drifts. We break down:
Authority lives in the control plane. If someone can:
Print the compliance packet.
Call it done. That’s the comfortable lie. In this episode, we dismantle the myth that sovereignty is a SKU, a geography, or a contract clause. Sovereignty is not residency. It’s not a marketing label. It’s not “EU-only” storage. Sovereignty is enforceable authority over:
- Identity
- Keys
- Data
- The control plane that can change all three
- Jurisdiction
- Identity authority
- Control plane authority
- Data plane placement
- Cryptographic custody
It does not transfer decision authority. Geography answers where.
Sovereignty answers who. 4️⃣ The CLOUD Act Reality Check Jurisdiction eats geography. If a provider can be compelled, sovereignty depends on one question: Does compelled access produce plaintext — or encrypted noise? That answer lives in your key custody model. 5️⃣ Encryption Without Custody Is Theater Encryption at rest is hygiene.
Customer-managed keys are better.
External custody with controlled release? That’s sovereignty. Because encryption isn’t the point. Who can cause decryption is. 🧠 Identity Is the Compiler of Authority Entra isn’t just an identity provider.
It’s a distributed decision engine that continuously mints tokens — portable authority. If token issuance drifts, your sovereignty drifts. We break down:
- Conditional Access entropy
- Token supply chain dependencies
- Risk-based controls vs deterministic enforcement
- Why policy rollback is more important than policy documentation
Authority lives in the control plane. If someone can:
- Assign roles
- Change policies
- Rotate keys
- Approve support access
- Azure Arc — powerful governance tool or sovereignty amplifier?
- Regional landing zones vs application landing zones
- Connected Azure Local — sovereignty by extension
- Disconnected Azure Local — sovereignty by isolation
- M365 Local — where sovereignty gains are real (and where they stop)
- Power Platform tenant isolation
- Connector enforcement gaps
- Guest identity implications
- Metadata gravity
- Why default-deny matters more than allowlists
- Identity authority
- Control plane authority
- Data plane constraints
- Cryptographic custody