Security

Cloud Sovereignty Deep Dive - AWS KMS Control Plane Analysis

XKS protects key material from extraction, but does it protect against legal compulsion to use those keys? Updated with AWS European Sovereign Cloud (GA January 2026).

Alexandre Agius

Alexandre Agius

AWS Solutions Architect

12 min read
Share:

The Problem

A common assumption is that AWS External Key Store (XKS) provides complete sovereignty over encryption keys because the key material never leaves the customer’s HSM. But there’s a gap between key material protection (can’t be extracted) and key usage control (can still be used under legal compulsion).

AWS documentation emphasizes what IS protected without clarifying what ISN’T. Security architects need to understand the real trust boundaries before designing encryption strategies.

Update (February 2026): The AWS European Sovereign Cloud went GA on January 14, 2026. This significantly changes the risk calculus for European customers. See the dedicated section below.

TL;DR

  • XKS protects key material (cannot be extracted) but not key usage (can still be used under legal compulsion)
  • The KMS control plane sits between your IAM policies and your external HSMβ€”AWS controls this layer
  • AWS European Sovereign Cloud now offers a middle ground: EU legal entity, EU-only operators, no non-EU dependencies
  • True sovereignty requires client-side encryption where AWS never sees plaintext or keys
  • For most workloads, European Sovereign Cloud + XKS is now the pragmatic choice for regulated European data
  • Cost jumps significantly: KMS ~$15k/3Y β†’ XKS ~$450k/3Y β†’ Client-side ~$650k/3Y

Who Should Read This

RoleWhy This Matters
Security ArchitectsUnderstand the real trust boundaries before designing encryption strategies
CISOsMake informed risk decisions about cloud sovereignty claims
Compliance OfficersKnow what β€œcustomer-controlled keys” actually means for audit purposes
CTOs / Tech LeadersEvaluate cloud adoption for regulated or sensitive workloads

The Solution

Map the full control flow (not just data flow) and choose the appropriate level of protection based on data classification and risk tolerance.

How It Works

The Trust Boundary Analysis

Even with XKS, the control flow is:

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                    AWS CONTROL PLANE                            β”‚
β”‚                                                                 β”‚
β”‚   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”      β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”      β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”‚
β”‚   β”‚ IAM Policy  β”‚ ──►  β”‚     KMS     β”‚ ──►  β”‚   XKS/HSM   β”‚    β”‚
β”‚   β”‚             β”‚      β”‚   Service   β”‚      β”‚  (customer) β”‚    β”‚
β”‚   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜      β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜      β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β”‚
β”‚                                                                 β”‚
β”‚   Customer controls     AWS controls        Customer controls   β”‚
β”‚   (via console)         (infrastructure)    (key material)     β”‚
β”‚                                                                 β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

The gap: The KMS service layer sits between IAM policy evaluation and the external HSM. This service layer is AWS-controlled infrastructure.

Detailed Attack Surface (Standard AWS Regions)

                        LEGAL COMPULSION SCENARIO
                        ========================

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                        AWS INFRASTRUCTURE                            β”‚
β”‚                        (US jurisdiction)                             β”‚
β”‚                                                                      β”‚
β”‚   NORMAL FLOW:                                                       β”‚
β”‚   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚
β”‚   β”‚  Your   │───►│ IAM Policy  │───►│     KMS     │───►│   XKS   │──┼─►
β”‚   β”‚  App    β”‚    β”‚ Evaluation  β”‚    β”‚   Service   β”‚    β”‚  Proxy  β”‚  β”‚
β”‚   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚
β”‚                                                                      β”‚
β”‚   COMPELLED FLOW:                                                    β”‚
β”‚   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚
β”‚   β”‚ Gov/NSA │───►│  BYPASSED   │───►│   Modified  │───►│   XKS   │──┼─►
β”‚   β”‚ Request β”‚    β”‚             β”‚    β”‚     KMS     β”‚    β”‚  Proxy  β”‚  β”‚
β”‚   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                                                              β”‚
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                      YOUR INFRASTRUCTURE                    β”‚        β”‚
β”‚                                                             β–Ό        β”‚
β”‚   XKS Proxy receives valid KMS request ─────────────► β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚
β”‚   HSM has no way to know it's unauthorized            β”‚   HSM    β”‚  β”‚
β”‚   HSM responds with decryption ◄──────────────────────│          β”‚  β”‚
β”‚                                                       β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚
β”‚   ⚠️  KEY MATERIAL PROTECTED                                        β”‚
β”‚   ❌  KEY USAGE NOT PROTECTED                                       β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

What XKS Protects Against

ThreatXKS Effective?
Key extraction (copying key material)βœ… Yes
Rogue AWS employee accessing keysβœ… Partially
Physical data center seizureβœ… Yes
Legal compulsion to USE keys❌ No
AWS control plane modification❌ No

The Mechanism

If a government compels AWS to modify the KMS control plane:

  1. An unauthorized principal could be injected at the service level
  2. KMS receives the decrypt request
  3. KMS calls the customer’s XKS Proxy
  4. The XKS Proxy sees a valid KMS request β†’ responds
  5. Data is decrypted

The key material was never extracted, but the key was used.

LawScope
CLOUD Act (2018)US gov can compel US companies to provide data stored anywhere
FISA Section 702Surveillance of non-US persons
National Security LettersSecret demands with gag orders

Key point: AWS is a US legal entity β†’ subject to US jurisdiction regardless of data location, customer location, or β€œSovereign Cloud” branding.

The Business Deterrent

The legal framework above describes what’s theoretically possible. But there’s a powerful counter-force: economic reality.

If AWS were caught complying with secret government orders to decrypt European customer data:

ConsequenceImpact
Immediate trust collapseEnterprise customers would flee overnight
Regulatory retaliationEU could ban AWS operations entirely
Competitor advantageEvery non-US cloud provider gains massively
Revenue destructionAWS’s ~$100B annual revenue at existential risk

The game theory: A US government demand to secretly decrypt European enterprise data would effectively be asking AWS to commit business suicide. The rational response is to fight such orders in court, restructure to make compliance impossible, or accept contempt charges rather than comply.

This isn’t naive optimismβ€”it’s economic deterrence. The same logic that prevents nuclear powers from using their weapons: the cost of action exceeds any possible benefit.

The β€œcanary” evidence: No major hyperscaler has ever been publicly caught complying with secret decryption orders for enterprise customers. Given the scale of investigative journalism, whistleblower incentives, and warrant canary monitoring, a major incident would likely surface. The absence of evidence isn’t proof, but it’s meaningful signal.

Bottom line: The legal compulsion risk is real but heavily mitigated by business incentives. AWS has more to lose from compliance than from resistance.

AWS European Sovereign Cloud (January 2026)

The AWS European Sovereign Cloud went generally available on January 14, 2026. This represents AWS’s most significant sovereignty investment: €7.8 billion in infrastructure, jobs, and skills development.

What’s Different

AspectStandard AWS RegionsEuropean Sovereign Cloud
Legal entityAmazon Web Services, Inc. (US)Dedicated EU legal entity (German law)
OperatorsGlobal AWS staffEU citizens located in EU only
ManagementUS-based leadershipEU-resident managing directors
OversightStandard AWS governanceIndependent advisory board (EU citizens)
InfrastructureGlobal dependenciesNo critical non-EU dependencies
MetadataMay leave regionStays in EU (IAM, configs, labels)
IsolationLogical separationPhysical AND logical separation
ResilienceConnected to global AWSCan operate if isolated from world

Architecture

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚              AWS EUROPEAN SOVEREIGN CLOUD                           β”‚
β”‚              (EU jurisdiction - German law)                         β”‚
β”‚                                                                     β”‚
β”‚   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚
β”‚   β”‚  Partition: aws-eusc    Region: eusc-de-east-1              β”‚  β”‚
β”‚   β”‚                                                              β”‚  β”‚
β”‚   β”‚  β€’ Dedicated IAM system (EU-only)                           β”‚  β”‚
β”‚   β”‚  β€’ Dedicated billing system (EUR, EU currencies)            β”‚  β”‚
β”‚   β”‚  β€’ European Trust Service Provider for certificates         β”‚  β”‚
β”‚   β”‚  β€’ European TLDs for Route 53 nameservers                   β”‚  β”‚
β”‚   β”‚  β€’ Technical controls block non-EU access                   β”‚  β”‚
β”‚   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚
β”‚                                                                     β”‚
β”‚   Operated by: EU citizens in EU                                    β”‚
β”‚   Managed by: StΓ©phane IsraΓ«l, Stefan Hoechbauer (EU residents)    β”‚
β”‚   Oversight: Independent EU advisory board                          β”‚
β”‚                                                                     β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
         β”‚
         β”‚ No critical dependencies
         β–Ό
    Can operate indefinitely even if isolated from global AWS

The Sovereignty Investment

The €7.8B investment isn’t just infrastructureβ€”it’s AWS buying legal and jurisdictional separation. They’re creating a defensible position against future legal compulsion:

  • Different legal entity β†’ US courts can’t directly compel an EU company
  • EU-only operators β†’ No US persons with access to compel
  • No non-EU dependencies β†’ Can’t be forced via infrastructure control
  • Independent oversight β†’ Advisory board adds accountability layer

This is essentially an insurance policy. AWS is paying billions to be able to say: β€œWe literally cannot complyβ€”different legal entity, EU-only staff, no access path.”

What This Means for XKS

The European Sovereign Cloud includes AWS KMS. Combined with XKS:

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚              AWS EUROPEAN SOVEREIGN CLOUD                           β”‚
β”‚              (EU jurisdiction)                                      β”‚
β”‚                                                                     β”‚
β”‚   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”      β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”      β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”        β”‚
β”‚   β”‚ IAM Policy  β”‚ ──►  β”‚     KMS     β”‚ ──►  β”‚   XKS/HSM   β”‚        β”‚
β”‚   β”‚  (EU-only)  β”‚      β”‚  (EU-only)  β”‚      β”‚  (customer) β”‚        β”‚
β”‚   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜      β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜      β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜        β”‚
β”‚                                                                     β”‚
β”‚   EU legal entity       EU operators        Customer controls       β”‚
β”‚   EU oversight          EU jurisdiction     key material           β”‚
β”‚                                                                     β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

The improvement: Even the control plane is now under EU jurisdiction, operated by EU citizens, with no US access path. The theoretical β€œcompelled flow” attack surface is dramatically reduced.

Services Available

The European Sovereign Cloud launched with comprehensive services including:

  • Compute: EC2, Lambda, EKS, ECS
  • Database: Aurora, DynamoDB, RDS
  • Storage: S3, EBS
  • AI/ML: SageMaker, Bedrock
  • Security: KMS, Private CA, IAM
  • Networking: VPC, Route 53

Expansion planned with Local Zones in Belgium, Netherlands, and Portugal.

True Sovereignty Options

Option 1: Client-Side Encryption

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”     β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”     β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚ Application  │────►│ Customer    │────►│    AWS      β”‚
β”‚              β”‚     β”‚ HSM         β”‚     β”‚  (ciphertextβ”‚
β”‚ Encrypt here β”‚     β”‚ (on-prem)   β”‚     β”‚   only)     β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜     β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜     β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

KMS never involved. AWS stores ciphertext only. Even under compulsion, AWS cannot decrypt.

Option 2: European Sovereign Cloud + XKS

Best of both worlds for European customers:

  • EU jurisdiction for control plane
  • Customer-controlled key material
  • Full AWS service portfolio
  • Monitoring capability on XKS Proxy

Option 3: XKS Proxy with Customer Authentication

Customer adds monitoring to the XKS Proxy:

  • Request allowlisting
  • Anomaly detection
  • Rate limiting
  • Kill switch

Can detect and block unusual access patterns.

Option 4: Split-Knowledge / Quorum

Both AWS and customer hold separate keys. Neither party can decrypt alone.

Cost Comparison (3-Year TCO)

Approach3Y TotalSovereignty Level
KMS (managed)~$9k⚠️ Low
KMS (CMK)~$15k⚠️ Low
CloudHSM~$170kπŸ”Ά Medium
European Sovereign Cloud + KMS~$20k*πŸ”· High
XKS + HSM~$440kπŸ”· High
European Sovereign Cloud + XKS~$460k*βœ… Very High
Client-side~$660kβœ… Very High

*Pricing in EUR, similar to standard regions. Check AWS European Sovereign Cloud pricing for current rates.

Recommendation Matrix

Data ClassificationRecommended Approach
PublicAWS KMS (AWS-managed)
InternalAWS KMS (Customer-managed CMK)
Confidential (EU)European Sovereign Cloud + KMS
Confidential (non-EU)XKS + monitored proxy
Secret/Regulated (EU)European Sovereign Cloud + XKS
Secret/Regulated (non-EU)Client-side encryption
ClassifiedOn-premises only

XKS Proxy Monitoring

If using XKS, implement monitoring on your proxy:

def handle_kms_request(request):
    log_request(request)

    if request.source_arn not in ALLOWED_ARNS:
        alert("Unauthorized source")
        return DENY

    if get_request_rate() > THRESHOLD:
        alert("Unusual request volume")
        return DENY

    if not is_business_hours():
        alert("Off-hours access attempt")

    return forward_to_hsm(request)

What I Learned

  • Marketing vs Architecture β€” β€œSovereignty” features protect key material but may not protect against key usage under legal compulsion
  • Trust Boundaries β€” Always map the full control flow, not just the data flow
  • Defense in Depth β€” XKS is valuable but not sufficient alone for true sovereignty
  • Documentation Gaps β€” Vendor documentation often emphasizes what IS protected without clarifying what ISN’T
  • Economic Deterrence β€” Business incentives can be as powerful as technical controls
  • Jurisdictional Engineering β€” The European Sovereign Cloud shows how infrastructure investment can create legal separation

My Take

The landscape has shifted. When I first analyzed this topic, the European Sovereign Cloud was still β€œin the works.” Now it’s GA, and it materially changes the risk calculus.

For European organizations with sovereignty requirements, the European Sovereign Cloud is now the default choice. The combination of EU legal entity, EU-only operators, independent oversight, and no non-EU dependencies addresses most practical concerns. Add XKS for defense in depth.

The business deterrent is underappreciated. Legal frameworks describe theoretical powers, but economic reality constrains their use. AWS complying with secret decryption orders for European enterprise customers would be business suicide—€100B+ in annual revenue at risk. This doesn’t make the risk zero, but it makes it extremely low.

Client-side encryption remains the gold standard for organizations that genuinely cannot accept any residual risk. But for most regulated European workloads, European Sovereign Cloud + XKS is now the pragmatic sweet spot.

The uncomfortable truth remains: Perfect sovereignty and cloud convenience are fundamentally at odds. But the gap has narrowed significantly. The European Sovereign Cloud isn’t just marketingβ€”it’s €7.8B of infrastructure specifically designed to create jurisdictional separation.

My practical advice:

  1. Classify your data honestly β€” Not everything is β€œsecret”
  2. Default to European Sovereign Cloud for regulated EU workloads
  3. Add XKS for crown jewels β€” Defense in depth
  4. Monitor aggressively β€” Detection > Prevention for most threats
  5. Document your risk acceptance β€” Make it a conscious business decision

What’s Next

  • Build XKS Proxy monitoring reference architecture
  • Create decision framework for data classification
  • Test client-side encryption with AWS Encryption SDK
  • Evaluate European Sovereign Cloud service parity for specific workloads

Updated February 2026 to reflect AWS European Sovereign Cloud general availability (January 14, 2026).

Alexandre Agius

Alexandre Agius

AWS Solutions Architect

Passionate about AI & Security. Building scalable cloud solutions and helping organizations leverage AWS services to innovate faster. Specialized in Generative AI, serverless architectures, and security best practices.

Related Posts

Back to Blog