For European technology leaders, the conversation around cloud infrastructure has fundamentally shifted. As 2026 unfolds, the choice is no longer a simple trade-off between cost and agility, but a complex decision balancing legal immunity against feature density. The era of ambiguity ended in late 2025 with the European Commission’s introduction of the Sovereignty Effectiveness Assurance Level (SEAL) framework, replacing political buzzwords with concrete metrics. This has created a critical fork in the road for decision-makers across the continent. On one path are the US hyperscalers, offering unparalleled AI capabilities but carrying the persistent legal risks of the US CLOUD Act. On the other are European sovereign providers, guaranteeing jurisdictional immunity and GDPR purity, but often lagging in advanced platform services. The landscape was further defined on April 17, 2026, when the Commission awarded its first cloud contract based on this new, measurable grid, a €180 million deal that serves as a benchmark for all future public and regulated industry procurement.
This move solidifies a new reality where data residency—where data is stored—is no longer confused with true data sovereignty—who has legal control over it. With US providers controlling an estimated 65% to 70% of the European cloud market, the introduction of the SEAL framework and the subsequent contract award signals a determined push to foster digital resilience and reduce dependency on non-EU supply chains. The debate has been sharpened by the inclusion of consortia leveraging US technology under EU oversight, sparking accusations of “sovereignty washing” and forcing enterprises to look beyond marketing claims. For CIOs in finance, healthcare, and government, navigating this landscape now requires a detailed understanding of the new rules, the key players, and the strategic trade-offs that will define Europe’s digital future.
In Brief:
- The EU’s new Sovereignty Effectiveness Assurance Level (SEAL) framework replaces vague sovereignty claims with five auditable levels (SEAL-0 to SEAL-4).
- On April 17, 2026, the European Commission awarded its first sovereign cloud contract worth €180 million, using the SEAL framework as a binding criterion.
- Three consortia (Post Telecom/OVHcloud, STACKIT, Scaleway) achieved SEAL-3 (Digital Resilience), while the Proximus consortium, including the Thales/Google venture S3NS, reached SEAL-2.
- The core conflict remains the US CLOUD Act, which gives US authorities potential access to data held by US companies, clashing with GDPR.
- European providers offer legal immunity but can have gaps in advanced AI and PaaS services compared to US hyperscalers.
- The recommended strategy for 2026 is a data classification-based hybrid model: using EU sovereign clouds for sensitive data and US hyperscalers for less critical, global-facing workloads.
The new benchmark: a deep dive into the EU’s SEAL framework
The core of Europe’s new strategy is the SEAL (Sovereignty Effectiveness Assurance Levels) scale. This five-step assessment system finally allows public bodies and regulated industries to evaluate the degree of control European entities have over a cloud service, moving the discussion from marketing assertions to auditable facts. The scale is designed to provide clarity for procurement and risk assessment.
The levels are defined with increasing stringency. SEAL-0 indicates no sovereignty, representing full dependence on third countries. SEAL-1 offers jurisdictional control, meaning EU law applies contractually, but technical operations remain externally controlled. SEAL-2, the minimum threshold for the recent EU tender, ensures data sovereignty, with data and key management in EU hands. The new gold standard for critical infrastructure is SEAL-3, guaranteeing digital resilience and immunity from non-EU supply chain disruptions. Finally, SEAL-4 represents full digital sovereignty, requiring a complete EU supply chain from the silicon chip to the software layer.
Understanding the eight SOV objectives
A provider’s SEAL score is not based on a single metric but is calculated from eight weighted objectives (SOV-1 to SOV-8). The supply chain (SOV-5) carries the highest weight at 20%, reflecting the challenge of structural dependence on US hardware and software. Other objectives include Strategic Sovereignty (EU ownership, 15%), Operational Sovereignty (independent EU staff operation, 15%), and Legal and Jurisdictional insulation from extraterritorial laws like the US CLOUD Act (10%). This weighted system allows a provider to compensate for weakness in one area with strength in another, a logic that has fueled debate around the framework’s application.
April 17, 2026: the day sovereignty became a measurable contract clause
The theoretical framework was put into practice when the European Commission awarded its first sovereign cloud contract, a deal valued at up to €180 million over six years. This event marked a turning point, making sovereignty a quantifiable category in a major public tender for the first time. Four European consortia were selected: Post Telecom (Luxembourg) with OVHcloud and CleverCloud; STACKIT of Schwarz Group (Germany); Scaleway (France); and Proximus (Belgium) with S3NS, Clarence, and Mistral.
Three of the four consortia successfully achieved the SEAL-3 “Digital Resilience” rating, demonstrating a strong capacity for independent operation. However, the inclusion of the Proximus consortium, which only met the minimum SEAL-2 threshold, has ignited significant controversy. This is primarily due to the participation of S3NS, a joint venture between the French company Thales and Google Cloud.
The S3NS controversy and the “sovereignty washing” debate
The heart of the debate lies in the nature of S3NS, which operates Google’s technology in European data centers under the majority control of Thales. The Commission argues that with a strict framework, even non-European technologies can meet minimum sovereignty levels. However, CISPE, the industry body representing 38 European cloud providers, labeled the decision a “clear own goal” that threatens to institutionalize sovereignty washing.
Critics point out that while operational controls may be robust, the legal reality is unchanged: Google, as a US parent company, remains subject to the CLOUD Act. This view was famously reinforced when a Microsoft executive admitted under oath to the French Senate that the company could not guarantee protection from US data requests. While pragmatic arguments exist—notably that European AI leaders like Mistral need scalable infrastructure that currently relies on hyperscaler tech—the decision highlights the tension between achieving pure sovereignty and leveraging best-in-class technology from global AI leaders.
The great divide: European providers vs. US hyperscalers in 2026
For CIOs, the 2026 landscape requires a careful evaluation of distinct trade-offs. The choice between European sovereign providers and US hyperscalers now hinges on a clear-eyed assessment of legal immunity, feature depth, and cost structure.
On the one hand, European providers like OVHcloud, Scaleway, and Hetzner offer native immunity to non-EU laws. Their corporate structures, ownership, and operational teams are entirely EU-based, providing the most straightforward path to compliance with directives such as NIS2 and DORA. On the other hand, US hyperscalers like AWS and Azure remain years ahead in feature depth, particularly in advanced generative AI pipelines, serverless architectures, and other specialized services that effectively commoditize innovation. This make-or-break year for sovereign cloud is defined by this gap.
A strategic framework for hybrid deployment
Given these realities, a data classification-based hybrid strategy is emerging as the most prudent approach. This involves segmenting workloads based on their sensitivity and jurisdictional requirements.
- Use EU Sovereign Clouds (SEAL-3) for: Personally Identifiable Information (PII) of EU citizens, health records, critical infrastructure telemetry, and intellectual property sensitive to industrial espionage. This is a core part of the trend toward cloud repatriation for sensitive data.
- Use US Hyperscalers (SEAL-1/2 with controls) for: Customer-facing applications needing global CDN reach, rapid prototyping of AI models using sanitized data, and non-sensitive commercial workloads where advanced platform services provide a competitive edge.
For organizations that must use US hyperscalers for technical reasons, External Key Management (EKM) offers a middle ground. By hosting encryption keys on a hardware security module managed by a European entity, data can be rendered opaque to the cloud provider, mitigating some risk at the cost of breaking certain advanced features that require clear-text data processing.
A strategic playbook for European enterprises and public bodies
The SEAL framework provides a unique opportunity to embed sovereignty into procurement, architecture, and contracts without getting lost in ideological debates. For European decision-makers, the next 12 months are critical for turning this new reference grid into a market standard. Taking proactive steps now can create a significant negotiating advantage with all cloud providers.
Immediate actions should focus on translating the framework into concrete business practices. This begins with updating tender specifications to require specific SEAL scores—at least SEAL-2 for personal data and SEAL-3 for critical infrastructure. Existing contracts with hyperscalers should be audited against the most sensitive SOV objectives, particularly legal jurisdiction (SOV-2), operational control (SOV-4), and supply chain dependencies (SOV-5). This audit will clarify an organization’s true sovereignty posture beyond marketing claims.
Preparing for the future of AI and regulation
AI workloads require special consideration. It is often more flexible to procure foundation models from providers like Mistral or Aleph Alpha separately from the underlying infrastructure, allowing for more granular control over sovereignty. Furthermore, a documented exit strategy for hyperscaler services is no longer optional; it is a core component of digital resilience. Finally, all organizations should closely track the proposed Cloud and AI Development Act (CADA), expected on May 27, 2026. This legislation will likely convert the SEAL framework into binding law, and preparing now can provide a 12 to 18-month lead time for necessary adjustments.
{“@context”:”https://schema.org”,”@type”:”FAQPage”,”mainEntity”:[{“@type”:”Question”,”name”:”What is the EU Commission’s SEAL framework?”,”acceptedAnswer”:{“@type”:”Answer”,”text”:”SEAL stands for Sovereignty Effectiveness Assurance Levels. It is a five-level scale (SEAL-0 to SEAL-4) that measures the degree of sovereign control European entities have over a cloud service. It was first used in a binding EU tender on April 17, 2026, to provide a clear, auditable standard for procurement beyond marketing terms.”}},{“@type”:”Question”,”name”:”Which providers won the EU’s 2026 sovereign cloud tender?”,”acceptedAnswer”:{“@type”:”Answer”,”text”:”Four European consortia were awarded contracts: Post Telecom with OVHcloud and CleverCloud; STACKIT of Schwarz Group; Scaleway; and Proximus with S3NS, Clarence, and Mistral. The first three achieved a SEAL-3 rating, while the Proximus consortium met the minimum SEAL-2 rating.”}},{“@type”:”Question”,”name”:”Why is the inclusion of S3NS in the tender controversial?”,”acceptedAnswer”:{“@type”:”Answer”,”text”:”S3NS is a joint venture between the French firm Thales and Google Cloud, operating Google’s technology under EU oversight. Critics, including the European cloud provider body CISPE, argue that because Google is a US company subject to the CLOUD Act, recognizing S3NS as sovereign amounts to ‘sovereignty washing’ and undermines the framework’s intent, even if operational controls are in place.”}},{“@type”:”Question”,”name”:”What should my enterprise’s sovereign cloud strategy be in 2026?”,”acceptedAnswer”:{“@type”:”Answer”,”text”:”For most enterprises, a hybrid strategy is recommended. Use high-assurance EU sovereign cloud providers (SEAL-3) for sensitive data like PII, health records, and critical IP. Use US hyperscalers for less sensitive, global-facing applications or for prototyping with sanitized data, leveraging their advanced features while managing risk through controls like external key management.”}}]}What is the EU Commission’s SEAL framework?
SEAL stands for Sovereignty Effectiveness Assurance Levels. It is a five-level scale (SEAL-0 to SEAL-4) that measures the degree of sovereign control European entities have over a cloud service. It was first used in a binding EU tender on April 17, 2026, to provide a clear, auditable standard for procurement beyond marketing terms.
Which providers won the EU’s 2026 sovereign cloud tender?
Four European consortia were awarded contracts: Post Telecom with OVHcloud and CleverCloud; STACKIT of Schwarz Group; Scaleway; and Proximus with S3NS, Clarence, and Mistral. The first three achieved a SEAL-3 rating, while the Proximus consortium met the minimum SEAL-2 rating.
Why is the inclusion of S3NS in the tender controversial?
S3NS is a joint venture between the French firm Thales and Google Cloud, operating Google’s technology under EU oversight. Critics, including the European cloud provider body CISPE, argue that because Google is a US company subject to the CLOUD Act, recognizing S3NS as sovereign amounts to ‘sovereignty washing’ and undermines the framework’s intent, even if operational controls are in place.
What should my enterprise’s sovereign cloud strategy be in 2026?
For most enterprises, a hybrid strategy is recommended. Use high-assurance EU sovereign cloud providers (SEAL-3) for sensitive data like PII, health records, and critical IP. Use US hyperscalers for less sensitive, global-facing applications or for prototyping with sanitized data, leveraging their advanced features while managing risk through controls like external key management.



