ISMS

Digital Sovereignty for SMEs: More Than a Political Buzzword

TL;DR
  • Digital sovereignty means you maintain control over your data, processes, and infrastructure at all times — independent of individual vendors, countries, or political decisions.
  • For mid-market companies, this is not an abstract concept: whoever depends on a single cloud vendor risks loss of control through price increases, feature changes, or geopolitical upheavals.
  • The EU is driving forward with Gaia-X, the Data Act, and the European Cloud Initiative an infrastructure that aims to give European companies more independence from US hyperscalers.
  • Practical steps include: choosing open standards and formats, preferring European providers, evaluating self-hosted solutions, and checking export capabilities before purchasing.
  • An ISMS is the logical starting point for digital sovereignty because it forces you to think systematically about data flows, dependencies, and risks.

What digital sovereignty concretely means

Digital sovereignty is a term that appears in political discussions, at EU summits, and in strategy papers. And precisely because of that, many mid-market business owners do not take the topic seriously. It sounds like Brussels, not like their own server room.

But if you strip away the political superstructure, a very practical question remains: do you have control over your own data and systems? Or are you in a situation where someone else can decide whether and how you access your data, what you pay for it, and what happens to your data?

Digital sovereignty can be divided into three dimensions:

Data sovereignty: You determine where your data resides, who accesses it, and under which legal framework it is processed. You can export your data at any time and migrate to another provider or to your own infrastructure.

Technological sovereignty: You are not dependent on a single technology, a single vendor, or a single ecosystem. You can replace components without your entire operation coming to a standstill.

Operational sovereignty: You can maintain your business processes even when external services fail, contracts are terminated, or political frameworks change.

For a mid-market company with 100 to 300 employees, these are not questions from a bird's-eye view. They are questions that arise in daily operations.

Why mid-market companies are particularly affected

Large corporations have their own legal departments to negotiate contracts with cloud providers. They have the market power to demand special conditions and commitments. When Microsoft raises prices for Enterprise Agreements, a negotiation team sits down and discusses discounts.

A mid-market company does not have this negotiating position. It accepts the standard contracts, the standard prices, and the standard terms. And it accepts the changes the vendor makes unilaterally, because the alternative would be a costly provider switch.

Price dependency

The dependency on a cloud vendor becomes particularly evident when prices increase. And they do increase. Microsoft has raised Microsoft 365 prices multiple times since 2019. VMware was acquired by Broadcom, and license costs have increased by a factor of 3 to 10 for many customers. Atlassian discontinued server licenses for Jira and Confluence and migrated all customers to the cloud — at significantly higher costs.

For a company that licenses its ISMS software as SaaS, this means: the vendor can raise prices at any time. You can cancel, but only if you have an alternative and can take your data with you. In practice, this creates exactly the situation known as vendor lock-in.

Feature dependency

Cloud vendors continuously change their products. Features are discontinued, user interfaces redesigned, APIs changed. Some of these changes are improvements. Others are not — at least not from your perspective. When a feature your process depends on disappears without warning, you have a problem you did not cause and cannot control.

Legal dependency

Your data resides with the cloud provider. Under which law? If the vendor is headquartered in the US, the data is potentially subject to the CLOUD Act, which grants US authorities access to data held by US companies under certain circumstances — even when the data physically resides in Europe.

For companies processing personal data under DSGVO (GDPR) or maintaining security documentation with confidential content, this is relevant. Not as fear-mongering about US intelligence agencies, but as a sober risk assessment: you have lost control over the legal framework under which your data is processed.

The EU strategy: Gaia-X, Data Act, and European Cloud

The European Union has recognized that European companies' dependence on US technology giants is a structural problem. The response consists of several initiatives:

Gaia-X

Gaia-X is a European initiative for a federated data infrastructure. The goal: an ecosystem of cloud services that meet European standards for data protection, transparency, and interoperability. Not a single European cloud as an alternative to AWS or Azure, but a framework ensuring that cloud services meet certain sovereignty requirements.

In practice, Gaia-X has so far produced more paper than results. But the framework for certifications and trust levels (Trust Anchors) is taking shape. For SMEs, Gaia-X will become relevant when cloud providers begin certifying themselves against these standards — similar to how ISO 27001 is a selection criterion for service providers today.

Data Act

The EU Data Act, applicable since September 2025, regulates among other things the switching between cloud providers. It obliges providers to enable data export and switching to other services. Artificial switching barriers are prohibited. By 2027, fees for data transfer during a provider switch should also drop to zero.

This is a direct improvement in data sovereignty for companies. Anyone using a cloud service today who wants to switch will have a legal right to receive their data in a standardized format.

European Cloud Initiative and EUCS

The European Cybersecurity Certification Scheme for Cloud Services (EUCS) defines security levels for cloud services. The discussion about a "sovereignty level" — requiring that data be processed exclusively in the EU and only European personnel have access — is politically contentious, but it shows the direction: Europe wants to define criteria that make it easier for companies to make sovereign cloud decisions.

Why SMEs benefit from this

These EU initiatives sound like large-corporation topics. But mid-market companies benefit on three levels:

1. Better switching options

Through the Data Act, switching between cloud providers becomes simpler and cheaper. This reduces vendor lock-in and strengthens your negotiating position. When you know you can switch at any time, you no longer accept unjustified price increases.

2. Clearer selection criteria

When cloud services are certified under EUCS, you can look for defined sovereignty levels during selection, instead of working through a hundred pages of privacy policies. This simplifies supplier assessment.

3. European alternatives

Political support for European cloud providers and open-source solutions is growing. This means more choice, more competition, and better terms for SMEs.

Practical steps toward digital sovereignty

Digital sovereignty is not a state you achieve once and check off. It is an attitude that translates into concrete decisions. These steps can be implemented immediately:

Step 1: Inventory dependencies

Create a list of all external services and vendors your company depends on. Not just the obvious ones like Microsoft 365 or AWS, but also the small ones: the ticketing system, the password tool, the DNS provider, the ISMS system.

For each service, assess:

  • How critical is it for business operations?
  • Are there alternatives you could switch to within 30 days?
  • Can you fully export your data at any time?
  • Under which legal framework is your data processed?
  • What happens if the provider discontinues the service?

This analysis reveals surprises in most companies. Typically, there are three to five services where an outage or termination would massively impact business operations — and for which there is no short-term alternative. Those are your critical dependencies.

Step 2: Prefer open standards and formats

With every new software decision, you should include open standards as a selection criterion:

  • Open data formats: JSON, CSV, XML instead of proprietary formats. Data you cannot export does not effectively belong to you.
  • Open interfaces: REST APIs, standard authentication (SAML, OIDC) instead of proprietary integrations
  • Open document formats: PDF/A, ODF instead of formats readable only with the manufacturer's software
  • Open protocols: IMAP instead of proprietary email systems, CalDAV/CardDAV instead of closed calendar ecosystems

This does not mean you cannot use proprietary software. It means you ensure during selection that you can extract your data at any time.

Step 3: Evaluate European providers

For many use cases, there are European alternatives that match US providers in functionality:

Area US provider European alternative
Cloud infrastructure AWS, Azure, GCP Hetzner, OVH, IONOS, Scaleway
Email and groupware Google Workspace, M365 Open-Xchange, Mailbox.org, Tutanota
File sharing Dropbox, Google Drive Nextcloud (self-hosted), Tresorit
Video conferencing Zoom, Teams Jitsi (self-hosted), Wire
Password manager LastPass, 1Password Vaultwarden (self-hosted), Psono
ISMS software Various US SaaS ISMS Lite (self-hosted, DE)

Preferring European providers is not nationalism — it is risk management. You reduce exposure to extraterritorial legislation and have shorter paths to legal enforcement in case of dispute.

Step 4: Self-hosted solutions for critical systems

Not everything needs to run on your own server. But for systems containing critical or confidential data, self-hosting is the consistent implementation of data sovereignty:

  • ISMS: Contains your vulnerabilities, risk assessments, and security gaps. In ISMS Lite, all data runs on your own server, in open formats, exportable at any time, and without internet dependency.
  • Password management: A self-hosted Vaultwarden stores all company passwords on your infrastructure
  • File sharing: Nextcloud provides file sharing, calendar, and collaboration without external dependency
  • Communication: Element/Matrix for chat, Jitsi for video conferencing

The effort for self-hosting is less than most people think. A modern Linux server with Docker takes a few hours to set up and a few hours per month for maintenance. That is an investment in independence.

Step 5: Exit strategy for every cloud service

For every cloud service you use, a documented exit strategy should exist. Not because you plan to switch, but because you must be able to:

  • What data needs to be exported?
  • In what format is the data exportable?
  • How long does the export take?
  • What alternative is available?
  • How long does the migration take?
  • Who is responsible?

These exit strategies belong in your IT asset management and should be reviewed annually.

The ISMS as a starting point for digital sovereignty

Why is an ISMS the logical entry point for digital sovereignty? Because it forces exactly the thought processes you need for sovereignty.

Risk assessment reveals dependencies

When you perform a risk assessment for your IT assets, you automatically identify critical dependencies. The risk "failure of the cloud ISMS provider" or "price increase from the ERP vendor" surfaces as soon as you systematically search for threats and vulnerabilities. The ISMS forces you to assess and treat these risks.

Protection needs assessment shows what is critical

The protection needs assessment evaluates which data and systems are particularly worthy of protection. Exactly these systems are the candidates for self-hosting or European providers. You do not need to self-host everything, but the data with high protection requirements should be under your maximum control.

Supplier assessment checks sovereignty

Within the framework of ISO 27001, you assess your suppliers and service providers. In doing so, you already check aspects like data location, certifications, contract clauses, and exit options. If you extend this assessment with sovereignty criteria (export capability, open standards, legal framework), you have a systematic basis for sovereign procurement decisions.

Documentation creates transparency

An ISMS documents your IT landscape, your data flows, and your dependencies. This transparency is the prerequisite for being able to assess sovereignty at all. Anyone who does not know where their data resides and which providers they depend on cannot make an informed decision about sovereignty.

What happens if you do nothing

The opposite of active sovereignty is passive trust: you rely on your cloud provider to remain fair, keep prices stable, protect data, and not discontinue the service. For most companies, this goes well for years. Until it does not.

A concrete example from 2024: Broadcom acquired VMware and changed the entire licensing model. Companies that had paid for VMware licenses for years for their virtualization suddenly faced price increases of 300 to 1,000 percent. Those who had not prepared an alternative faced a choice: pay or migrate during live operations. Both painful, one of them avoidable.

Similar scenarios occurred with Atlassian (discontinuation of server licenses), Oracle (aggressive license audits), and Google (shutdown of Google Domains). The pattern is always the same: a vendor changes the rules, and those who are dependent have no negotiating position.

For an ISMS, the risk is particularly high because the data is sensitive and migration is complex. If your ISMS provider is acquired, doubles their prices, or discontinues the service, you need an alternative. And that alternative must exist beforehand — not afterward.

Common objections and honest answers

"European providers are less capable"

In some areas, that is true. No European cloud provider has the breadth and depth of AWS. But for most mid-market requirements — including hosting, email, file sharing, databases, and application servers — European providers are fully sufficient. The question is not whether you get the same functionality, but whether you get the functionality you actually need.

"Self-hosting is too much effort"

For a company with an IT department, self-hosting individual applications is not a disproportionate effort. Not everything needs to be self-hosted, but the most critical systems should be. An ISMS server, a password manager, and a file sharing system on your own server — for that, an experienced admin needs one day for setup and a few hours per month for updates.

"Our customers require cloud certifications"

Some customers require SOC 2 or ISO 27001-certified cloud services. That is a valid point for certain customer-facing systems. But it does not apply to internal systems like your ISMS. No customer requires your internal security management system to run in a SOC 2-certified cloud. On the contrary: some customers prefer that you keep your security data under your own control.

"Gaia-X has not delivered anything"

True, Gaia-X has so far promised more than it has delivered. But digital sovereignty does not depend on Gaia-X. You can make sovereign decisions today: choose European providers, demand open standards, evaluate self-hosted solutions. Gaia-X is one of many initiatives, and whether it succeeds does not change the merit of taking your own sovereignty steps.

Checklist: Digital sovereignty for SMEs

Immediately actionable

  • Create dependency inventory: capture all external services with criticality and switching costs
  • Document exit strategy for the three most critical cloud services
  • Define export capability as a mandatory criterion for the next software procurement
  • Check whether the current ISMS system allows a complete data export

Short-term (3 months)

  • Extend protection needs assessment with sovereignty criteria
  • Add data location, legal framework, and export capability questions to supplier assessment
  • Evaluate self-hosted alternatives for systems with high protection requirements
  • Identify European alternatives for current US services

Medium-term (12 months)

  • Migrate most critical systems to own infrastructure or European providers
  • Anchor open standards as a binding procurement criterion in the IT policy
  • Integrate annual sovereignty review into the management review
  • Sensitize employees to the topic (why we use certain tools and not others)

Sovereignty is not a project, but an attitude

Digital sovereignty is not a state you reach and then you are done. It is an attitude that influences every IT decision. Every time you evaluate new software, you ask: can I get out of here? Every time you sign a contract, you check: under which law does my data reside? Every time you make an architecture decision, you ask: am I creating a dependency I cannot control?

That is not distrust of cloud providers. It is professional risk management. And that is exactly what an ISMS demands of you: recognize, assess, and treat risks. Dependency on a single vendor is a risk. Lack of export capability is a vulnerability. Unclear data processing in third countries is a threat. The ISMS gives you the tool to manage these risks systematically, instead of ignoring them until it is too late.

Digital sovereignty does not start in Brussels. It starts in your server room.

Further reading

Digital sovereignty starts with your own security data

ISMS Lite runs on your server, stores data in open formats, and is exportable at any time. No cloud dependency, no data with third parties, no surprises.

Install now