<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>EU Cloud Patterns</title><link>https://www.eucloudpatterns.eu/</link><description>Recent content on EU Cloud Patterns</description><generator>Hugo</generator><language>en</language><lastBuildDate>Sun, 12 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.eucloudpatterns.eu/index.xml" rel="self" type="application/rss+xml"/><item><title>AWS European Sovereign Cloud: What Four German GmbHs Can't Fix About the CLOUD Act</title><link>https://www.eucloudpatterns.eu/posts/aws-esc-sovereignty-assessment/</link><pubDate>Sun, 12 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.eucloudpatterns.eu/posts/aws-esc-sovereignty-assessment/</guid><description>&lt;p>On January 15, 2026, AWS flipped the switch on the European Sovereign Cloud (ESC). Physically separate infrastructure in Brandenburg, Germany. Four dedicated German GmbH entities. Two managing directors who are EU citizens. An advisory board with independent members. A separate console at console.aws.eu. Separate root certificates. EU-resident-only operations.&lt;/p>
&lt;p>AWS calls it &amp;ldquo;the only fully-featured, independently operated sovereign cloud.&amp;rdquo;&lt;/p>
&lt;p>That&amp;rsquo;s a strong claim. And the engineering behind it is genuinely impressive. The question is whether it&amp;rsquo;s sovereignty or the most expensive compliance theater in European cloud history.&lt;/p></description></item><item><title>Translating EDPB's 2025 Guidance Into Cloud Architecture: A Compliance Roadmap</title><link>https://www.eucloudpatterns.eu/posts/edpb-2025-guidance-cloud-architecture/</link><pubDate>Thu, 09 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.eucloudpatterns.eu/posts/edpb-2025-guidance-cloud-architecture/</guid><description>&lt;p>The European Data Protection Board published its 2025 annual report in April 2026, and the headline is reassuring: no new enforcement crackdowns on cloud. Instead, the EDPB is leaning into what it calls &amp;ldquo;enhanced clarity, support, and engagement&amp;rdquo; (the theme of its landmark Helsinki Statement from July 2025).&lt;/p>
&lt;p>For cloud architects, this shift matters. It means the regulatory target has stopped moving. The EDPB&amp;rsquo;s guidance on what &amp;ldquo;compliant cloud&amp;rdquo; looks like is now stable enough to plan architectures around it. That&amp;rsquo;s rare in EU data protection. But it also means there&amp;rsquo;s no more excuse for vagueness: the expectations are now explicit, and enforcement will follow.&lt;/p></description></item><item><title>Cyber Resilience Act and Open Source: What EU Financial Cloud Teams Must Do Now</title><link>https://www.eucloudpatterns.eu/posts/cra-open-source-eu-financial-cloud/</link><pubDate>Tue, 07 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.eucloudpatterns.eu/posts/cra-open-source-eu-financial-cloud/</guid><description>&lt;p>Ninety-six percent of software products contain open source components. That figure comes from the German Open Source Business Alliance, and it&amp;rsquo;s the one you should have in mind when you read the scope of &lt;em>Regulation (EU) 2024/2847&lt;/em>, the Cyber Resilience Act. The CRA applies to any &amp;ldquo;product with digital elements&amp;rdquo; placed on the EU market. That&amp;rsquo;s almost everything. If your financial infrastructure runs on Kubernetes, Kafka, Vault, or PostgreSQL sourced from a commercial vendor, you have compliance questions to answer before September 2026.&lt;/p></description></item><item><title>ESMA Benchmark Supervision Extends to EEA: What It Means for Your Financial Data Stack</title><link>https://www.eucloudpatterns.eu/posts/esma-eea-benchmark-supervision-cloud/</link><pubDate>Tue, 07 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.eucloudpatterns.eu/posts/esma-eea-benchmark-supervision-cloud/</guid><description>&lt;p>A Commission proposal published earlier this year would extend the direct supervisory authority of ESMA (the European Securities and Markets Authority, the EU&amp;rsquo;s financial markets regulator) over benchmark administrators into the EEA/EFTA zone (the European Economic Area, which extends EU single market rules to Norway, Iceland, and Liechtenstein via the EFTA states). On paper, CELEX:52026PC0143 is an administrative alignment exercise: the EU&amp;rsquo;s position in the EEA Joint Committee on amending Annex IX of the EEA Agreement. In practice, it signals something more significant for financial cloud architects.&lt;/p></description></item><item><title>Google Analytics to EU-Sovereign Analytics: A Migration Guide for Regulated Teams</title><link>https://www.eucloudpatterns.eu/posts/ga-to-eu-sovereign-analytics-migration/</link><pubDate>Tue, 07 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.eucloudpatterns.eu/posts/ga-to-eu-sovereign-analytics-migration/</guid><description>&lt;p>Three European data protection authorities issued rulings against Google Analytics within six months of each other: Austria&amp;rsquo;s DSB in January 2022, France&amp;rsquo;s CNIL in February 2022, Italy&amp;rsquo;s Garante in June 2022. The rulings didn&amp;rsquo;t ban Google Analytics outright, but they established a clear position: routing personal data through Google&amp;rsquo;s US infrastructure, with its FISA and CLOUD Act exposure, is not compatible with GDPR.&lt;/p>
&lt;p>Four years later, many EU regulated teams are still running GA4.&lt;/p></description></item><item><title>Migrating Transactional Email to EU-Sovereign Infrastructure</title><link>https://www.eucloudpatterns.eu/posts/eu-email-migration/</link><pubDate>Sat, 04 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.eucloudpatterns.eu/posts/eu-email-migration/</guid><description>&lt;p>Your password reset emails are processing data in Virginia. Possibly the Carolinas too. Definitely in the United States.&lt;/p>
&lt;p>If you&amp;rsquo;re using SendGrid, Mailgun, or Postmark to send transactional emails for an EU-facing service, that&amp;rsquo;s where the personal data goes: email addresses, message content, delivery metadata, everything. The email service provider&amp;rsquo;s infrastructure is headquartered and controlled from the US. Even if you select an &amp;ldquo;EU region&amp;rdquo; option, you&amp;rsquo;ve created a data routing problem under GDPR Article 44. The email provider processes the data as a controller&amp;rsquo;s processor, but the processor&amp;rsquo;s processor (their cloud vendor, backup systems, logging infrastructure) may be US-based.&lt;/p></description></item><item><title>Moving AI Inference to EU-Sovereign Infrastructure</title><link>https://www.eucloudpatterns.eu/posts/ai-ml-gpu-migration/</link><pubDate>Sat, 04 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.eucloudpatterns.eu/posts/ai-ml-gpu-migration/</guid><description>&lt;p>Your document classification model is running on a GPU in Oregon. If that model is processing customer KYC documents or insurance claims, that&amp;rsquo;s a problem. You&amp;rsquo;re storing European personal data on US infrastructure subject to US jurisdiction, US surveillance law, and (most critically) no explicit audit rights or control over who can access the compute layer.&lt;/p>
&lt;p>Most ML teams never question this. Lambda Labs, CoreWeave, Vast.ai are cheap, reliable, and have GPUs in stock when others are sold out. They&amp;rsquo;re also all US companies operating under US law. That matters more than it used to.&lt;/p></description></item><item><title>Multi-AZ Failed. Now DORA Does Too.</title><link>https://www.eucloudpatterns.eu/posts/multi-az-kinetic-attack/</link><pubDate>Sat, 04 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.eucloudpatterns.eu/posts/multi-az-kinetic-attack/</guid><description>&lt;p>On March 1-2, 2026, Iranian drones and ballistic missiles struck AWS data center facilities in the United Arab Emirates and Bahrain. Two of three Availability Zones in AWS&amp;rsquo;s ME-CENTRAL-1 region went offline simultaneously. Within minutes, 60+ AWS core services failed. Dubai International Airport experienced operational disruptions. Abu Dhabi Commercial Bank&amp;rsquo;s platform and mobile app went dark. SadaPay, a fast-growing fintech, stopped processing payments.&lt;/p>
&lt;p>But the real revelation came in the aftermath: customers running Multi-AZ architectures across a single region had zero resilience. Only those with active-active setups across multiple regions and multiple providers stayed online.&lt;/p></description></item><item><title>Why Hosting Location Still Matters Under GDPR</title><link>https://www.eucloudpatterns.eu/posts/gdpr-hosting-location/</link><pubDate>Sat, 04 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.eucloudpatterns.eu/posts/gdpr-hosting-location/</guid><description>&lt;p>GDPR does not require you to host data in the EU. This is the first thing practitioners get wrong, and it creates a false sense of flexibility that evaporates the moment you need to scale, comply with DORA, or win a public-sector contract.&lt;/p>
&lt;p>What GDPR actually does: it regulates how data &lt;em>leaves&lt;/em> the European Economic Area. If you keep data inside the EEA, Chapter V of the GDPR (the international transfers section) doesn&amp;rsquo;t apply at all. Your compliance problem shrinks. But if you use a US cloud provider, even in an Irish data center, you&amp;rsquo;ve just triggered a different set of rules that most fintech teams are not equipped to manage.&lt;/p></description></item><item><title>ANSSI's Supervision Doctrine: What Your Cloud Architecture Needs Now</title><link>https://www.eucloudpatterns.eu/posts/anssi-supervision-doctrine/</link><pubDate>Fri, 03 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.eucloudpatterns.eu/posts/anssi-supervision-doctrine/</guid><description>&lt;p>On May 7, ANSSI closes its public consultation on security supervision architectures for cloud-hosted systems. This matters more than it sounds. The guidance that emerges will reshape how EU financial services build detection and response infrastructure.&lt;/p>
&lt;p>The tension ANSSI is trying to solve is real: you need sovereign oversight of your cloud environment, but you also can&amp;rsquo;t afford to run detection in isolation. Cloud logging alone generates terabytes of noise. You need a SOC. But if your SOC is in the US, you&amp;rsquo;ve lost sovereignty. If it&amp;rsquo;s a tiny French MSSP with no threat intelligence, you&amp;rsquo;ve lost operational maturity. ANSSI&amp;rsquo;s reference architectures are meant to show architects how to have both.&lt;/p></description></item><item><title>Cloud Contract Sovereignty After the VMware Lesson</title><link>https://www.eucloudpatterns.eu/posts/contract-sovereignity/</link><pubDate>Wed, 01 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.eucloudpatterns.eu/posts/contract-sovereignity/</guid><description>&lt;p>In April 2024, Broadcom terminated the VMware Cloud Service Provider programme. Providers who had built multi-year businesses on VMware licensing (some with contracts signed a decade earlier) received notice periods measured in months, not years. Platforms migrated. Customers scrambled. In some cases, the contracts that were supposed to protect everyone turned out to protect no one.&lt;/p>
&lt;p>Cloud contracts in EU financial services raise one question more often than you&amp;rsquo;d expect: &amp;ldquo;what does this agreement actually say?&amp;rdquo; The VCSP situation is worth applying to your own stack. Go back and reread the agreements covering your critical infrastructure. What you&amp;rsquo;ll typically find isn&amp;rsquo;t reassuring.&lt;/p></description></item><item><title>Privacy Notice</title><link>https://www.eucloudpatterns.eu/privacy-notice/</link><pubDate>Wed, 01 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.eucloudpatterns.eu/privacy-notice/</guid><description>&lt;p>This site is about data sovereignty. It would be a bit embarrassing to run it on a surveillance stack.
Here&amp;rsquo;s what happens (and what doesn&amp;rsquo;t) when you visit eucloudpatterns.eu.&lt;/p>
&lt;h2 id="analytics">Analytics&lt;/h2>
&lt;p>This site uses &lt;a href="https://plausible.io" target="_blank">Plausible Analytics&lt;/a>, an EU-based, open-source analytics tool. Plausible is incorporated in Estonia and processes data within the EU.&lt;/p>
&lt;p>&lt;strong>What Plausible does not do:&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>Set cookies on your device&lt;/li>
&lt;li>Use localStorage, sessionStorage, or any other browser storage&lt;/li>
&lt;li>Generate persistent identifiers that track you across sessions or across sites&lt;/li>
&lt;li>Collect your IP address in any stored or identifiable form&lt;/li>
&lt;/ul>
&lt;p>&lt;strong>What Plausible does do:&lt;/strong>&lt;/p></description></item><item><title>Sovereign by Default: Kubernetes Security for EU Finance</title><link>https://www.eucloudpatterns.eu/posts/kubernetes-security/</link><pubDate>Wed, 01 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.eucloudpatterns.eu/posts/kubernetes-security/</guid><description>&lt;p>Here&amp;rsquo;s a configuration problem that shows up more often than it should: a team migrates to EU-sovereign Kubernetes infrastructure, ticks the compliance box, and continues pulling container images from &lt;code>docker.io&lt;/code>. They&amp;rsquo;ve moved the control plane to OVHcloud. Their images are still transiting Docker Hub servers in the US. SEAL-3 infrastructure, SEAL-1 workloads.&lt;/p>
&lt;p>This isn&amp;rsquo;t an edge case. Default Kubernetes configuration is US-centric because most of the tooling ecosystem was built for and by teams that didn&amp;rsquo;t need to think about jurisdiction. The image registry default is &lt;code>docker.io&lt;/code>. The DNS resolver follows the node&amp;rsquo;s &lt;code>/etc/resolv.conf&lt;/code>, which on a freshly provisioned cloud VM often points to the provider&amp;rsquo;s resolver, which can chain to &lt;code>8.8.8.8&lt;/code>. Admission webhooks run without egress restrictions. Monitoring gets wired to whatever SaaS tool the ops team already uses. Datadog and Grafana Cloud are the common defaults, both US-operated.&lt;/p></description></item><item><title>SEAL Assessment: Who Sees Your Security Telemetry?</title><link>https://www.eucloudpatterns.eu/posts/seal-security-supply-chain/</link><pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate><guid>https://www.eucloudpatterns.eu/posts/seal-security-supply-chain/</guid><description>&lt;p>There&amp;rsquo;s a sovereignty blindspot that shows up consistently in EU financial services, and it&amp;rsquo;s not in the cloud architecture. It&amp;rsquo;s in the security stack.&lt;/p>
&lt;p>Teams spend considerable effort getting their cloud infrastructure to SEAL-3: EU-sovereign compute, EU-operated Kubernetes, encrypted secrets with EU-held keys. Then they wire the whole thing up to a US-headquartered SOC provider whose analysts have full access to security telemetry that includes customer transaction patterns, authentication events, and API call logs. The infrastructure is sovereign. The entity watching the infrastructure isn&amp;rsquo;t.&lt;/p></description></item><item><title>What DORA Actually Expects from Your Cloud Architecture</title><link>https://www.eucloudpatterns.eu/posts/dora-cloud-architecture/</link><pubDate>Sun, 29 Mar 2026 00:00:00 +0000</pubDate><guid>https://www.eucloudpatterns.eu/posts/dora-cloud-architecture/</guid><description>&lt;p>Your first Register of Information submission was supposed to be April 30, 2025. If you&amp;rsquo;re reading this in March 2026, you&amp;rsquo;ve had one set of supervisory questions from your national regulator about what you submitted. The ESAs designated 19 critical ICT third-party providers last November. That includes AWS, Azure, and Google Cloud. Which means someone at your regulator is now running formal examinations of how those providers operate, and more importantly, whether you&amp;rsquo;ve built an exit strategy that actually works if one of them becomes unavailable.&lt;/p></description></item><item><title>What SEAL Level Is Your Architecture Actually At?</title><link>https://www.eucloudpatterns.eu/seal-framework/</link><pubDate>Sun, 29 Mar 2026 00:00:00 +0000</pubDate><guid>https://www.eucloudpatterns.eu/seal-framework/</guid><description>&lt;p>In October 2025, the European Commission adopted SEAL (&lt;em>Sovereignty Effective Assurance Level&lt;/em>) as its official Cloud Sovereignty Framework. Four levels. Eight measurable criteria. One simple question:&lt;/p>
&lt;blockquote>
&lt;p>Whose legal system decides what happens to your data?&lt;/p>
&lt;/blockquote>
&lt;p>Finance teams often announce they&amp;rsquo;ve &amp;ldquo;gone sovereign&amp;rdquo; by moving workloads to a European region on AWS. The same conversation usually leads to the realisation that moving your data to Dublin doesn&amp;rsquo;t change the fact that the US government can compel Amazon to hand it over. Those are two very different things. SEAL exists to stop that confusion.&lt;/p></description></item><item><title>Geopolitical Risk Is Now a Cloud Architecture Problem</title><link>https://www.eucloudpatterns.eu/posts/geopolitical-pressures-cloud-risk/</link><pubDate>Sat, 28 Mar 2026 10:00:00 +0000</pubDate><guid>https://www.eucloudpatterns.eu/posts/geopolitical-pressures-cloud-risk/</guid><description>&lt;p>On 27 March 2026, the three European Supervisory Authorities (EBA, EIOPA, and ESMA) published their spring Joint Committee update on risks and vulnerabilities in the EU financial system. The top two risk areas: geopolitical pressures and rising private finance risks. If you read it as a macro risk report, it looks like the kind of document that gets circulated at the board level and filed away. Read it through a DORA lens, and it lands differently.&lt;/p></description></item><item><title>CISPE vs Broadcom: VMware and EU Cloud Sovereignty</title><link>https://www.eucloudpatterns.eu/posts/cispe-vs-broadcom/</link><pubDate>Fri, 27 Mar 2026 10:00:00 +0000</pubDate><guid>https://www.eucloudpatterns.eu/posts/cispe-vs-broadcom/</guid><description>&lt;p>On 19 March 2026, CISPE filed a formal competition complaint with the European Commission against Broadcom. The charge: Broadcom is using its $61 billion VMware acquisition to squeeze European cloud providers out of the market. If you&amp;rsquo;re running VMware anywhere in your stack, you should care about this. A lot.&lt;/p>
&lt;h2 id="what-actually-happened">What Actually Happened&lt;/h2>
&lt;p>&lt;picture>
 
 &lt;source type="image/avif"
 srcset="https://www.eucloudpatterns.eu/posts/cispe-vs-broadcom/timeline_hu7671805304756434837.png 400w,
 https://www.eucloudpatterns.eu/posts/cispe-vs-broadcom/timeline_hu4384307427353511198.png 800w,
 https://www.eucloudpatterns.eu/posts/cispe-vs-broadcom/timeline_hu11681401963465067430.png 1200w"
 sizes="(max-width: 600px) 400px,
 (max-width: 1000px) 800px,
 1200px">
 
 &lt;source type="image/webp"
 srcset="https://www.eucloudpatterns.eu/posts/cispe-vs-broadcom/timeline_hu7671805304756434837.png 400w,
 https://www.eucloudpatterns.eu/posts/cispe-vs-broadcom/timeline_hu4384307427353511198.png 800w,
 https://www.eucloudpatterns.eu/posts/cispe-vs-broadcom/timeline_hu11681401963465067430.png 1200w"
 sizes="(max-width: 600px) 400px,
 (max-width: 1000px) 800px,
 1200px">
 
 &lt;img 
 src="https://www.eucloudpatterns.eu/posts/cispe-vs-broadcom/timeline_hu11681401963465067430.png"
 srcset="https://www.eucloudpatterns.eu/posts/cispe-vs-broadcom/timeline_hu7671805304756434837.png 400w,
 https://www.eucloudpatterns.eu/posts/cispe-vs-broadcom/timeline_hu4384307427353511198.png 800w,
 https://www.eucloudpatterns.eu/posts/cispe-vs-broadcom/timeline_hu11681401963465067430.png 1200w"
 sizes="(max-width: 600px) 400px,
 (max-width: 1000px) 800px,
 1200px"
 alt="Timeline diagram showing the Broadcom-VMware saga from November 2023 acquisition through price hikes and partner program termination, to CISPE&amp;rsquo;s dual legal challenges and the expected CADA proposal in May 2026." 
 title="The Broadcom-VMware Timeline"
 width="1200"
 height="900"
 loading="lazy"
 data-lightbox="/posts/cispe-vs-broadcom/timeline_hu15780754450760048561.png"
 style="max-width: 100%; height: auto;">
 &lt;/picture>&lt;/p></description></item><item><title>Satellites Meet Solvency II: EIOPA's Sovereignty Play</title><link>https://www.eucloudpatterns.eu/posts/eiopa-data-collection/</link><pubDate>Fri, 27 Mar 2026 00:00:00 +0000</pubDate><guid>https://www.eucloudpatterns.eu/posts/eiopa-data-collection/</guid><description>&lt;p>The EU built a satellite programme that&amp;rsquo;s collected 50 petabytes of Earth observation data. Heading toward 100. EU-owned satellites. EU-operated cloud infrastructure. Entirely hosted on European territory. Free for anyone to use. It&amp;rsquo;s called &lt;em>Copernicus&lt;/em>, and unless you work in Earth observation or regulatory tech, you&amp;rsquo;ve probably never heard of it.&lt;/p>
&lt;p>Then in March 2026, something interesting happened. &lt;em>EIOPA&lt;/em>, the EU&amp;rsquo;s insurance and pensions supervisor, quietly published a white paper with EUSPA. They explained how they plan to use this satellite data to supervise your industry. Specifically: they&amp;rsquo;ll match real-time flood imagery from Sentinel satellites against your Solvency II regulatory reporting to estimate what natural disasters will actually cost you. As the disasters happen.&lt;/p></description></item></channel></rss>