8 minute read | January.20.2026
Scrutiny of European Union's dependence on non-European cloud services is intensifying amid geopolitical tensions and rising cyber risk. U.S. hyperscalers control more than 70% of the EU cloud market, while European providers’ share has nearly halved since 2017.1
There are growing concerns that U.S. dominance could become a source of geopolitical leverage. Similar concerns exist regarding Chinese cloud providers expanding into the European cloud market. As a result, the EU and its member states are increasingly focused on foreign clouds.
The complexity of this legal landscape has fueled concern and confusion about the legal requirements for non-European cloud services usage. To help, we address and dispel three common myths surrounding European cloud regulations.
European law focuses mostly on risk-based assessments rather than on prohibiting non-European clouds in general. In some cases, this can lead to de facto data localization requirements or other measures that non-European cloud providers and their customers need to consider. Nevertheless, non-European cloud providers are not excluded.
To navigate European laws that could lead to de facto data localization requirements, non-European cloud providers and their customers should pay special attention to:
GDPR (Regulation (EU) 2016/679)
The key rules for cloud services concern personal data transfers to countries outside the EU. Such transfers are only allowed if:
Even with an adequacy decision, it is sometimes advisable to prepare SCCs and TIAs in case the adequacy decision is later struck down, as in the Schrems I and Schrems II cases.2
EHDS (Regulation (EU) 2025/327)
Data Act (Regulation (EU) 2023/2854)\
NIS-2 Directive (Directive (EU) 2022/2555)
The Directive on Security of Network and Information Systems (NIS-2 Directive) aims to establish a high common level of cybersecurity across the EU, covering cloud computing service providers.
Covered entities must implement appropriate technical, operational, and organizational measures to manage cyber risks and mitigate incident impacts, tailored to their specific risk profile.
The directive requires conformity with the state of the art but does not demand absolute security or provide a prescriptive list of controls.
While NIS-2 does not generally mandate data localization, risk assessments under Article 21 may require companies to choose EU-based providers, particularly where supply chain security and subcontractor relationships raise significant concerns.
DORA (Regulation (EU) 2022/2554)
Non-European cloud use by EU institutions and member state agencies has sparked sovereignty debates, as concerns about foreign interference run particularly high in the public sector. As such, the EU and member states, including Germany and France, have introduced additional requirements for government clouds use.
Despite these additional safeguards, non-European cloud providers are often still able to perform services.
In October 2025, the European Commission published its Cloud Sovereignty Framework, defining eight sovereignty objectives for EU institutions procuring cloud services.
Some key sovereignty objectives for non-European cloud providers and their customers involve considering whether the cloud service is:
Since these objectives are only minimum requirements and are not precisely defined, the required level for each objective may differ for each procurement. Furthermore, the ultimate decision will likely be predominantly influenced by other factors, such as price and performance.
Germany’s Federal Office for Security in Information Technology (BSI) has issued binding minimum standards for federal agencies using external clouds. To meet these requirements, providers must comply with the BSI’s Cloud Computing Compliance Criteria Catalogue (C5).
Key expectations for non‑European providers include:
The C5 criteria do not impose explicit localization, nor do they exclude non-European cloud providers from serving federal authorities in Germany.
The French requirements for cloud use in the public sector (SecNumCloud certification) are some of the strictest in Europe.
Key requirements:
Although these requirements may seem to ban non-European cloud providers at first glance, practice shows that, through joint ventures with local companies, non-European cloud providers can still serve clients with their cloud products.
The term "sovereign cloud" is a buzzword. Despite the lack of a defined legal term or a universally understood concept, the term is used frequently.
A protectionist interpretation links the term “sovereign cloud” to clouds operated by domestic companies using domestic servers. However, this approach has technical limitations, as the provider’s origin or server location alone does not guarantee the intended level of security. A court in Ontario ordered the French provider OVHcloud to disclose data stored on European servers to Canadian police, illustrating that location is not an absolute shield.
A more convincing interpretation treats “digital sovereignty” as shorthand for compliance with EU law, focusing on safeguards against third‑country access to cloud‑hosted data. EU regulations prioritize preserving data protection and cybersecurity standards rather than mandating localization. Germany’s Federal Office for Information Security (BSI) adopts this pragmatic view, stating that relying only on local cloud solutions is often “simply not possible” and would block access to global innovation while creating economic and administrative risks.
In practice, digital sovereignty is best served by ensuring that providers comply with EU rules and respect EU fundamental rights, rather than by imposing bans or rigid localization. Specific location demands in individual cases often exceed binding law and reflect policy preferences rather than legal obligations.
For questions, please contact Dr. Christian Schröder.
1Förster, European cloud market grows – and US providers benefit, Heise‑online, July 29, 2025.
2CJEU, Judgement of 6 October 2015, Schrems I, C-362/14 (https://curia.europa.eu/juris/document/document.jsf?text=&docid=169195&pageIndex=0&doclang=EN&mode=lst&dir=&occ=first&part=1&cid=8245117); CJEU, Judgement of 16 July 2020, Schrems II, C-311/18 (https://curia.europa.eu/juris/document/document.jsf?text=&docid=228677&pageIndex=0&doclang=EN&mode=lst&dir=&occ=first&part=1&cid=8245926).