Amazon Web Services has announced the first customers of its European Sovereign Cloud, a physically and logically isolated EU‑based infrastructure. While hospitals, credit bureaus and smart‑meter firms praise the service, privacy experts warn that U.S. law – notably the CLOUD Act – may still give American authorities a back‑door to data, raising questions under GDPR and national regulations.
AWS Showcases Early Adopters of Its European Sovereign Cloud

Amazon Web Services (AWS) has begun publicly naming the organisations that have signed up for its European Sovereign Cloud (ESC), a service marketed as a fully EU‑resident, legally insulated environment for the most sensitive workloads. The rollout, which became generally available in January 2026, is intended to answer growing alarm in Europe over the continent’s reliance on U.S. hyperscalers and the risk that foreign law‑enforcement powers could compel access to data stored abroad.
What happened?
AWS announced that three high‑profile European entities are now running production workloads on the ESC:
| Customer | Sector | Use case |
|---|---|---|
| University Hospital Essen | Healthcare | Storing patient records and training AI models for diagnostics |
| Schufa | Credit reporting | Hosting a new credit‑scoring platform that processes data of 69 million German consumers |
| Diehl Metering | Smart‑energy & water | Centralising meter‑reading, billing and monitoring data for municipal utilities |
The service currently lives in a single AWS Region in Brandenburg, Germany, but AWS has pledged to add further EU locations before the end of 2027.
Legal basis – why the EU cares
GDPR and data‑localisation
The General Data Protection Regulation (GDPR) requires that personal data of EU residents be processed with appropriate safeguards when transferred outside the Union (Article 44‑50). While GDPR does not demand that data stay physically in the EU, many organisations interpret “adequate protection” as a need for data‑localisation – especially for health, financial and critical‑infrastructure data that attract heightened supervisory scrutiny.
The U.S. CLOUD Act
The CLOUD Act (Clarifying Lawful Overseas Use of Data Act, 2018) allows U.S. law‑enforcement agencies to issue a warrant compelling any American company, including subsidiaries, to produce data stored anywhere in the world, provided the request follows due‑process standards. European courts have repeatedly warned that the CLOUD Act can clash with GDPR’s article 48 requirement for a “legitimate basis” to transfer data to a third country.
How AWS frames the ESC
AWS argues that the ESC provides three layers of protection:
- Legal – a separate German legal entity (AWS Europe Sovereign Cloud GmbH) that is subject to German law and EU data‑protection authorities.
- Operational – strict access‑control policies that prohibit even AWS staff from viewing customer data without explicit customer consent.
- Technical – end‑to‑end encryption where the customer holds the encryption keys, meaning that even a court order would not force AWS to hand over plaintext data.
Critics, however, point out that the ownership chain remains American. As Forrester analyst Dario Maisto explains, “the ESC is a fully isolated infrastructure with a separate legal entity in Germany, but it is still entirely owned by the U.S. parent company. That limits its immunity from the CLOUD Act.”
Impact on users and companies
For the listed customers
- University Hospital Essen can now train large‑scale AI models on patient data without having to export that data to a non‑EU region. This satisfies the German Federal Data Protection Act (BDSG) and the EU‑wide push for “data‑centric AI” under the EU AI Act.
- Schufa gains a clear compliance narrative for regulators who have been skeptical of cross‑border credit‑scoring data pipelines. By keeping the data in Germany, Schufa reduces the risk of a “Schrems‑II”‑style invalidation of any data‑transfer mechanism.
- Diehl Metering can offer municipal utilities a single‑tenant environment that complies with the NIS2 Directive, which mandates strong security for critical‑infrastructure operators.
For the broader market
The ESC announcement may accelerate European sovereign‑cloud spending, which the European Commission estimates will triple between 2025‑2027. Competing projects – Thales‑Google’s S3NS, Microsoft’s Azure Germany Sovereign and the EU‑backed Gaia‑X initiative – will now have concrete case studies to reference when courting risk‑averse customers.
What changes are required?
For AWS and its customers
- Transparent legal guarantees – AWS should publish a detailed “CLOUD‑Act‑shield” clause that explains how a U.S. warrant would be handled, ideally with a binding corporate veil that forces any request to be routed through German courts first.
- Key‑management autonomy – Customers must retain sole control of encryption keys, stored in a German‑based Hardware Security Module (HSM) that is not reachable by AWS personnel.
- Independent audit – Regular, third‑party audits (e.g., by the European Union Agency for Cybersecurity – ENISA) should verify that data never leaves the EU network.
For regulators
- Data‑protection authorities (DPAs) should update their guidance to explicitly address U.S.‑owned sovereign‑cloud services, clarifying when a Data Transfer Impact Assessment (DTIA) is still required.
- The European Commission could consider a “European Cloud Charter” that sets baseline contractual terms for any non‑EU provider seeking to claim sovereignty.
The bigger picture
The ESC illustrates a hybrid approach to data sovereignty: physical separation of infrastructure combined with legal and technical safeguards. Yet, as long as the ultimate ownership remains American, the CLOUD Act will remain a legal shadow that European courts and data‑protection officers must keep in mind.
If AWS can prove that its German entity truly operates independently – with local staffing, local jurisdiction, and no back‑door for U.S. warrants – the ESC could become a credible model for other U.S. providers. Until then, organisations should treat the ESC as one layer of a broader compliance strategy that includes strong encryption, local key custody, and rigorous contractual clauses.
For further reading:

Comments
Please log in or register to join the discussion