- The US CLOUD Act (2018) allows US authorities to access data held by US companies, regardless of whether the servers are in the US, Ireland, or Frankfurt. A German data center does not protect against a US subpoena.
- The CJEU's Schrems II ruling (2020) invalidated the Privacy Shield and requires a case-by-case assessment for every data transfer to the US. Standard Contractual Clauses alone are not sufficient if the legal framework of the third country undermines the protection.
- ISMS data is particularly sensitive: risk analyses, vulnerability reports, audit findings, and security architectures form a blueprint of your entire IT security. In the wrong hands, they are an attack manual.
- The EU-US Data Privacy Framework (DPF) since 2023 eases the situation for certified US recipients, but its durability is uncertain. A strategy that relies solely on the DPF is risky.
- Self-hosting is the cleanest solution for ISMS software: data stays on your own infrastructure, no third-country transfer, full control. ISMS Lite costs from 500 euros per year and runs on any PHP server.
The CLOUD Act Is Not a Theoretical Risk
In March 2018, the US Congress passed the Clarifying Lawful Overseas Use of Data Act, known as the CLOUD Act. The law codifies what was previously legally disputed: US authorities may compel US companies via court order or subpoena to hand over data that is in their possession, under their control, or in their custody. Where the data is physically stored is irrelevant.
In concrete terms, this means: if you use Microsoft 365, Google Workspace, AWS, Salesforce, or any other US service, US authorities can access your data even if the servers are in Frankfurt, Amsterdam, or Dublin. The "server location Germany" that many providers prominently advertise changes nothing about the legal situation. What matters is not where the data resides. What matters is who controls the infrastructure.
What the CLOUD Act Specifically Permits
The CLOUD Act distinguishes two pathways:
Path 1: Direct access under US law. US law enforcement agencies (FBI, DOJ, SEC, and others) can demand the handover of data through a warrant, subpoena, or court order. The US provider must deliver the data, even if it is stored on a server in the EU.
Path 2: Executive Agreements. The CLOUD Act enables bilateral agreements between the US and other states that allow direct data access without going through mutual legal assistance requests. Such an agreement has existed with the United Kingdom since 2022. There is no Executive Agreement with the EU so far; negotiations are ongoing.
What the CLOUD Act is not: It is not a blank check for indiscriminate mass surveillance. Every access requires a legal basis, typically within the framework of a criminal investigation. The problem, however, is that the affected EU companies usually learn nothing about it. US providers are in certain circumstances even obligated to keep the access secret (gag order). You may therefore not even know that a US authority has reviewed your data.
Why "Data Center in Germany" Does Not Help
Many US providers advertise EU data centers as a solution for data protection concerns. This sounds good but does not solve the problem. The CLOUD Act is tied to control over the data, not to its physical location. As long as a US company holds the keys, operates the infrastructure, or manages the data, the CLOUD Act applies.
Some providers attempt to circumvent this problem through "data trustee" models: a European partner manages the keys, and the US provider technically has no access. Elegant models in theory, rarely fully implemented in practice and legally untested.
Schrems II: What the CJEU Decided
On July 16, 2020, the European Court of Justice ruled in Case C-311/18 (Schrems II) that the EU-US Privacy Shield was invalid. The ruling was not a surprise: Max Schrems had already brought down its predecessor, Safe Harbor, in 2015 (Schrems I).
The key findings of the Schrems II ruling:
1. US surveillance law does not provide equivalent protection. The CJEU found that the US surveillance programs (particularly Section 702 FISA and Executive Order 12333) are not limited to what is strictly necessary and do not provide EU citizens with effective legal remedies.
2. The Privacy Shield is invalid. Since the Privacy Shield could not compensate for the deficiency in US law, the CJEU declared it void. Immediately, with no transition period.
3. Standard Contractual Clauses remain valid, but... The CJEU did not fundamentally object to Standard Contractual Clauses (SCCs) as a transfer mechanism. However, it requires that the data exporter assess for each individual transfer whether the law of the third country undermines the protection provided by the SCCs. If that is the case, the exporter must implement supplementary measures or cease the transfer.
4. Transfer Impact Assessment is mandatory. The ruling implies the obligation to conduct a Transfer Impact Assessment (TIA) for every SCC-based transfer: a documented assessment of the legal situation in the destination country.
The EU-US Data Privacy Framework: Schrems III on the Horizon
Since July 2023, the EU-US Data Privacy Framework (DPF) provides a new adequacy decision for the US. US companies that certify with the Department of Commerce are considered recipients with an adequate level of data protection.
The basis of the DPF is Executive Order 14086 by President Biden, which limits US surveillance powers and creates a new redress mechanism (Data Protection Review Court) for EU citizens.
Whether this is sufficient is disputed. Max Schrems and his organization noyb have announced they will also challenge this decision before the CJEU. The points of criticism:
- The Executive Order is not a law but a presidential decree. A future president can revoke or amend it at any time.
- The Data Protection Review Court is not an independent court in the European sense but a body within the executive branch.
- Section 702 FISA, the central legal basis for mass surveillance, was renewed in late 2023, not reformed.
For your compliance strategy, this means: the DPF is an improvement over the vacuum that existed after Schrems II. But relying on it as the sole basis for data transfers to the US long-term is a gamble.
Why ISMS Data Is Particularly Sensitive
Not all data you store in the cloud is equally sensitive. Customer addresses in a CRM are one thing. ISMS data is quite another.
Your ISMS contains:
- Risk analyses with specific probabilities and damage potentials for your organization
- Vulnerability reports showing where your IT security has gaps
- Audit findings with documented deviations and open actions
- Network diagrams and security architectures revealing the structure of your IT infrastructure
- Control status showing which controls are implemented and which are not
- Incident reports with details of past security incidents
- Supplier assessments with security questionnaires and ratings
- Management review minutes documenting strategic security decisions
In their entirety, this data is a blueprint of your entire IT security. Anyone who reads it knows your weaknesses, your defense strategy, and your priorities. In the hands of an attacker, it is an attack manual. In the hands of a competitor, it is competitive intelligence. In the hands of a foreign authority, it is a detailed insight into your company that you would never voluntarily provide.
If a US prosecutor accesses the data of your ISMS cloud provider via the CLOUD Act, they do not get a few email addresses. They get the complete documentation of your security posture, including all known vulnerabilities. This is a qualitatively different risk than with most other cloud services.
Standard Contractual Clauses as a Solution? Only Partially
After Schrems II, many companies resort to Standard Contractual Clauses (SCCs) as a transfer mechanism. SCCs are a contract between you and the US provider in which the provider commits to maintaining a European level of data protection. The problem: the CLOUD Act obliges the US provider to hand over data regardless of what the SCCs say.
There is therefore a direct conflict: the SCCs say "protect the data to EU standards," the CLOUD Act says "hand the data over to US authorities." Who wins this conflict? In practice: the US provider. No US company will risk a contempt-of-court conviction to protect a European customer.
What Supplementary Measures Can Achieve (and What They Cannot)
The European Data Protection Board (EDPB) recommends supplementary technical measures to strengthen the protection of the SCCs:
| Measure | Protection against CLOUD Act? | Practicality |
|---|---|---|
| Encryption with own key management | Theoretically yes, if the provider has no access to the keys | Difficult to impossible for SaaS applications that need to process data |
| Pseudonymization | Yes, if the mapping table resides exclusively in the EEA | Complex, barely practicable for ISMS data |
| Zero-knowledge architecture | Yes, if technically implemented cleanly | Only a few providers offer this, functionality often limited |
| Contractual commitments from the provider | No, a contract does not override US law | Breach of contract via CLOUD Act is legally compelled |
The crux with ISMS software: for the application to function, it must be able to process the data. An encrypted risk assessment that the server cannot read, it also cannot display, filter, or search. End-to-end encryption is possible for email or file storage; for a SaaS application with search functions, dashboards, and reports, it is practically impossible.
Practical Example: The Auditor Asks Where Your ISMS Data Is Stored
Imagine the following situation: your company is being certified under ISO 27001. The external auditor reviews Control A.5.23 (cloud services) and discovers that you use a US ISMS software as SaaS.
Auditor: "Where is your ISMS data stored?"
You: "In the cloud. Data center in Frankfurt."
Auditor: "Who is the provider?"
You: "A US company with an EU data center."
Auditor: "How do you assess the risk of US authorities accessing your risk assessments and vulnerability reports?"
You: "..."
Auditor: "Have you conducted a Transfer Impact Assessment? What supplementary measures have you implemented? How do you ensure that the CLOUD Act does not compromise the confidentiality of your ISMS data?"
These questions are not harassment. They are the logical consequence of Schrems II and the CLOUD Act. And they point to a core problem: ISMS data is among the most sensitive information in your organization, and you store it with a provider that can be legally compelled to hand it over to a foreign authority.
Writing a clean Transfer Impact Assessment for this constellation that concludes "everything is fine" is legally ambitious. You would need to argue that the supplementary measures technically prevent CLOUD Act access. For a SaaS application that processes your data in plaintext, this argument is hard to sustain.
The Three Options for Your ISMS
If you take the data transfer issue seriously, you have three options:
Option 1: EU Provider Without US Ties
You choose an ISMS provider that is headquartered in the EU, has no US parent company, and does not transfer data to the US. This eliminates the CLOUD Act entirely. No third-country transfer, no TIA needed, no Schrems II issues.
Advantage: Clean from a compliance perspective, no additional documentation effort. Disadvantage: The selection of purely European ISMS SaaS providers is limited. And you trade the CLOUD Act problem for another dependency: you entrust your most sensitive data to a third-party provider, with all the risks that entails — from insolvency to data breaches to price increases.
Option 2: US Provider with Compensating Measures
You stay with your US provider, document the risk as part of your risk assessment, and implement supplementary measures: SCCs with TIA, technical encryption where possible, contractual commitments.
Advantage: No provider switch needed. Disadvantage: As described above, technical compensation is limited for SaaS ISMS tools. You document a residual risk that you cannot eliminate. Some supervisory authorities and auditors accept this, others do not.
Option 3: Self-Hosting
You host your ISMS software on your own infrastructure or with an EU hosting provider of your choice. Your data never leaves the EU, no US company has access, no third-country transfer takes place.
Advantage: Maximum control, no data transfer issues, no TIA needed, no dependency on the DPF. The auditor gets a clear answer: "Our ISMS data is on our own server in Germany. No third party has access." Disadvantage: You need infrastructure and someone to operate it. For a company with 50 to 500 employees, this is typically already available — a standard Linux server with PHP is sufficient.
Why Self-Hosting Is the Cleanest Solution
Self-hosting is not the right choice for every application. For ISMS software, it is the best one.
Reason 1: You eliminate the problem instead of compensating for it. No Transfer Impact Assessment, no Standard Contractual Clauses, no discussion about supplementary measures. If the data never leaves your data center, there is no data transfer problem. This clarity saves you hundreds of pages of documentation and hours of discussions with auditors and data protection officers.
Reason 2: You are independent of political decisions. The DPF could be struck down tomorrow. A new Executive Agreement may or may not come. Your self-hosted solution is unaffected. You don't need to restructure your strategy when the political situation between the EU and the US changes.
Reason 3: ISMS data is structurally suited for self-hosting. An ISMS is not a real-time collaboration tool with thousands of simultaneous users. It is maintained by a small team (ISM, IT management, a few risk owners), requires no horizontal scaling, and no 99.999% availability. A well-configured server is sufficient.
Reason 4: Total Cost of Ownership. Most ISMS SaaS solutions cost between 3,000 and 15,000 euros per year, depending on user count and feature scope. ISMS Lite costs 500 Euro pro Jahr as a self-hosted license, including unlimited users, runs on any PHP 8.3 server, and stores everything as flat files without a database. Infrastructure costs for a small Linux server are between 10 and 30 euros per month.
Reason 5: Git versioning instead of vendor lock-in. Since ISMS Lite stores all data as Markdown and YAML in the file system, you can version your entire ISMS in Git. Every change is traceable, you have a complete audit log, and if you want to switch providers, you simply take your files with you. No data export, no migration project, no vendor lock-in.
Checklist: ISMS Data and Data Sovereignty
Check these points for your current ISMS solution:
- Provider headquarters: Where is the provider headquartered? Does it have a US parent company?
- Corporate structure: Is the provider or any of its group companies subject to the US CLOUD Act?
- Server location: Where is the data stored? Are backups replicated to the US?
- Encryption: Who holds the keys? Does the provider have technical access to the unencrypted data?
- Transfer mechanism: On what basis does the data transfer take place (DPF, SCCs, none)?
- TIA available: Have you conducted and documented a Transfer Impact Assessment?
- Supplementary measures: What technical, organizational, and contractual measures have you implemented?
- DPA reviewed: Does the data processing agreement contain provisions for handling government data requests?
- Exit strategy: Can you switch providers without losing your ISMS data?
- Auditor-ready: Can you explain in two sentences where your ISMS data is stored and why it is secure?
Common Mistakes
Mistake 1: "Data center in Frankfurt" as a sufficient answer. The server location alone says nothing about the legal access situation. What matters is who controls the infrastructure and which legal framework the provider is subject to.
Mistake 2: Treating the DPF as a permanent solution. The EU-US Data Privacy Framework is a political agreement, not a law of nature. It can be struck down, like its two predecessors. Anyone who builds their entire compliance strategy on it risks being left without a transfer basis in the event of a Schrems III ruling.
Mistake 3: Treating ISMS data like other cloud data. Not all data has the same protection requirement level. A CRM in the cloud is a defensible decision. Storing your complete protection needs assessment with all identified vulnerabilities at a US provider is a different risk category.
Mistake 4: Not conducting a TIA. Many companies skip the Transfer Impact Assessment because it is time-consuming. This is not a forgotten formality. It is a documented regulatory violation that will be noticed during an inspection by the supervisory authority.
Mistake 5: Dismissing self-hosting as too burdensome. Yes, self-hosting requires infrastructure. But the alternative is not "no effort" — it is "effort in a different place": creating TIAs, managing SCCs, implementing supplementary measures, reviewing them regularly, justifying them at every audit. Compared to that, setting up a Linux server with ISMS Lite is the more pragmatic option.
What You Should Do Now
Step 1: Check which legal framework your current ISMS provider is subject to. US parent company? CLOUD Act scope? Clarify this before the auditor asks.
Step 2: If your provider is subject to the CLOUD Act, conduct a Transfer Impact Assessment. Document the legal situation, the risks, and the supplementary measures. Include the results in your risk assessment.
Step 3: Evaluate the three options (EU provider, US provider with compensation, self-hosting) based on your specific situation. Consider not only the price but also the documentation effort, the long-term planning security, and the question of how you will argue your case to the auditor.
Step 4: If you decide on self-hosting, calculate the Total Cost of Ownership. An ISMS Lite on your own server costs you ab 500 Euro pro Jahr oder als Einmalkauf für 2.500 Euro plus 120 to 360 euros hosting per year. Compare that with your current SaaS price plus the annual effort for TIA updates, SCC management, and compliance documentation.
Data sovereignty for ISMS data is not an abstract compliance topic. It is a practical decision about who may have access to the most sensitive information in your organization. Make this decision consciously, not by default.
Further Reading
- Internationaler Datentransfer: Standardvertragsklauseln und Angemessenheitsbeschlüsse
- Self-Hosted vs. Cloud: Datensouveränität bei Compliance-Software
- ISO 27001 A.5.23: Cloud-Dienste sicher nutzen
- Cloud-Sicherheit für KMU: Die häufigsten Fehlkonfigurationen und wie du sie vermeidest
- Auftragsverarbeitung: AVV prüfen und Dienstleister bewerten
