As noted in my previous blog, “Incorporating a Sovereign Cloud into a Multicloud Strategy,” high complexity is one of the top 2 challenges organizations face when implementing sovereign cloud solutions (the top challenge is high cost).
Globally, organizations now consider sovereignty to be of great importance. This recognition is at the top level: 86% of CEOs have told us it’s their highest priority in the coming years, ranking alongside the need to address cybersecurity threats (source: IDC’s Worldwide CEO Sentiment Survey [January 2022]; N = 389).
At this stage, it’s worth noting that the aim of sovereignty in the digital context is not all about dominance. The ultimate aim of both sovereign solution providers and their customers is to become stronger competitors on the global digital stage.
Put another way, IDC believes digital sovereignty gives data-driven organizations a license to operate.
So how do you go about implementing sovereign solutions? It begins with customer organizations asking themselves whether they consider digital sovereignty to be a strategic priority.
Of course, the answer could be “no.”
But these organizations should consider if sovereignty is mandated by the need to comply with industry regulations or local data privacy laws. If it is, then organizations will need to begin sovereignty journeys.
But once again, the answer could be “no” — in which case these organizations should ask themselves if sovereignty is needed to gain access to an ecosystem of partners.
Still “no”?
Well, at this point, if sovereignty isn’t even important to the organization’s customers or brand, then it may still be worth considering a solution for the business and technical advantages that sovereignty can bring. More on that later.
But for those who have decided upon implementing a sovereign solution, there are two key initial steps.
First, they need to conduct a review of what will be needed for sovereignty. This should include an assessment of current security and compliance processes, tools, platforms, and skill sets.
Next, organizations will need to classify their data and apps according to sovereign requirements. Not all workloads will need to be migrated to a sovereign cloud; only those deemed to include sensitive data that can be classed as “top secret” or “highly confidential” need to be considered.
Basically, these are the data that will have catastrophic consequences for a business if they’re leaked, shared without authority, or the subject of a security breach.
It may look simple on paper, but this data classification exercise is fraught with complexity, especially for organizations that lack the specialist skills needed for sovereignty. These include, for example, expertise in data management and governance, cybersecurity, and API development. The latter is particularly important: Dedicated APIs will help the organization run a sovereign cloud within regulatory and legal frameworks.
As mentioned in my earlier blog, sovereignty solutions are, by nature, restrictive. Working in an ecosystem that includes partnerships between global and local providers is vital to ensure the balance necessary to maintain sovereignty but not stifle innovation.
The final part of the deployment process is to maintain security and compliance on an ongoing basis. This must be a shared responsibility between all partners. User organizations should largely take responsibility for security in a sovereign cloud; the provider has to account for security of the sovereign cloud.
Suggested Framework for Implementing Sovereign Solutions
Despite the challenges of implementing a sovereign solution, there are benefits to be had — even for organizations that do not consider sovereignty to be a must.
IDC research has shown that 71%* of organizations believe that digital sovereignty helps level the playing field and prevents unfair competition in digital markets. Nearly four-fifths (78%)* say it gives them greater control over their data and digital infrastructure and improves their ability to shape digital transformation efforts in a self-determined way.
More than three-quarters* of organizations around the world believe digital sovereignty enhances customer, government, and stakeholder trust in their operations and businesses and can therefore open access to new global markets.
저자 소개
Rahiel Nasir is responsible for leading and contributing to IDC's European cloud and cloud data management research programs, as well as supporting associated consulting projects.
In addition, he is the lead analyst for IDC's worldwide Digital Sovereignty research program.
Nasir has been watching technology markets and writing about them throughout his professional life.
Prior to joining IDC, he was a research analyst with 451 Research (now part of S&P Global Market Intelligence), where he covered the datacenter infrastructure and services markets across the EMEA region.
채널별 검색
오토메이션
기술, 팀, 인프라를 위한 IT 자동화 최신 동향
인공지능
고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트
오픈 하이브리드 클라우드
하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요
보안
환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보
엣지 컴퓨팅
엣지에서의 운영을 단순화하는 플랫폼 업데이트
인프라
세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보
애플리케이션
복잡한 애플리케이션에 대한 솔루션 더 보기
오리지널 쇼
엔터프라이즈 기술 분야의 제작자와 리더가 전하는 흥미로운 스토리
제품
- Red Hat Enterprise Linux
- Red Hat OpenShift Enterprise
- Red Hat Ansible Automation Platform
- 클라우드 서비스
- 모든 제품 보기
툴
체험, 구매 & 영업
커뮤니케이션
Red Hat 소개
Red Hat은 Linux, 클라우드, 컨테이너, 쿠버네티스 등을 포함한 글로벌 엔터프라이즈 오픈소스 솔루션 공급업체입니다. Red Hat은 코어 데이터센터에서 네트워크 엣지에 이르기까지 다양한 플랫폼과 환경에서 기업의 업무 편의성을 높여 주는 강화된 기능의 솔루션을 제공합니다.