Anatomy of a
Governed Cloud

From Policy to Proof in Four Steps
emma
How policy-driven multi-cloud governance turns compliance policies into operational evidence — across hyperscaler and EU-sovereign infrastructure.
01
DEFINE
Policy as Intent

Translate regulation into enforceable rules

Regulatory requirements from DORA, NIS2, and the EU Cloud Sovereignty Framework (EU CSF) are translated into operational guardrails that specify the constraints a workload must satisfy: where data can reside, who can access the control plane, how encryption keys are managed, and whether a tested exit path exists.

Policies are not just documentation. They are operational guardrails— version-controlled, auditable, and evaluated at every deployment.

Data Residency

Where data at rest and in transit must be located. Specifies geographic and jurisdictional boundaries per workload classification.

Operational Sovereignty

Who can access infrastructure management, support functions, and the control plane. Defines jurisdictional requirements for personnel access.

Exit Capability

Whether a tested, documented migration path to an alternative provider exists. Required for workloads supporting critical business functions under DORA.

INTENT DOCUMENTED
Demonstrates regulatory awareness and governance planning. Creates the auditable baseline against which all subsequent operations are measured.
↳ DORA Art. 5–11: ICT risk management framework · ↳ NIS2 Art. 21: Cybersecurity risk management measures · ↳ EU CSF: Sovereignty objectives definition
02
CLASSIFY
Assigning Workloads to Governance Tiers

Translate policy into operational categories

Workloads are assessed based on their data sensitivity, business criticality, and regulatory obligations to determine the appropriate governance tier. Each tier specifies what controls are mandatory, which infrastructure environments it may use, and the expected exit/migration requirements, setting the stage for policy enforcement in deployment.

Sovereign-critical

Personal or regulated data, mission-critical workloads; requires EU-resident operations, tested exit paths, and full policy compliance.

Governed-standard

Business workloads with compliance requirements; moderate operational oversight, concentration risk monitoring.

Flexible

Non-critical workloads; optimized for performance, cost, and operational agility.

CLASSIFICATION CLEAR
Workloads are explicitly mapped to the right governance tier, creating an enforceable blueprint for deployment and operational controls.
↳ DORA Art. 28(4)(a): Classification of ICT services supporting critical or important functions · ↳ NIS2 Art. 21(1): Proportionate controls · ↳ EU CSF: Tiered sovereignty assurance (SEAL scoring)
03
DEPLOY
Enforcement at Placement

Enforce policy at the point of deployment

Every workload deployment is evaluated based on the assigned governance tier before it reaches infrastructure. If the target environment satisfies all constraints, the deployment proceeds. If it doesn't, the deployment is blocked — not flagged for review later, but stopped at the point of intent.

This means a workload classified as sovereign-critical cannot accidentally land on non-sovereign infrastructure. Policy enforcement is architectural, not procedural.

Deployment Request
⚡ Policy Evaluation ← Governance Tier
✓ PASS → Deploy to eligible infrastructure
✕ FAIL → Block + log reason
☁️ Hyperscaler Infrastructure — analytics, ML training, dev, tooling. Full ecosystem access under documented governance.
🏛️ EU-Sovereign Infrastructure — personal data, regulated operations. Full jurisdictional control, EU-resident access, customer-managed encryption.
COMPLIANCE ENFORCED
Proves that governance is operational, not aspirational. Every deployment carries a recorded decision trail: which policies were evaluated, which constraints were checked, and why the placement was approved.
↳ DORA Art. 28: Third-party risk management and concentration risk · ↳ DORA Art. 29: Concentration risk analysis · ↳ NIS2 Art. 21: Implemented security measures
04
GOVERN
Evidence as Output

Generate audit-ready evidence continuously

Once workloads are running, the governance layer continuously verifies that they still comply with their policies defined as guardrails. Infrastructure changes, configuration drift, new data flows, or policy updates are all evaluated in real time. Evidence is produced as a byproduct of operations — not assembled before an audit.

The result is a complete, provable chain from policy intent through deployment enforcement to current runtime state.

Continuous Compliance Status

A real-time view of every workload's alignment with its governance tier. Non-compliant workloads are automatically blocked from progressing.

Decision Trail

For every deployment: policy definition → evaluation result → placement decision → current state. Exportable for audit review.

Drift Detection

Continuous monitoring for changes that affect compliance: provider config changes, new data flows, policy updates. Alerts when compliance may be at risk.

PROOF DELIVERED
Provides audit-ready evidence on demand — not prepared for auditors, but generated by the way you operate. Demonstrates continuous compliance, not point-in-time assertions.
↳ DORA Art. 5–11: Continuous ICT risk monitoring · ↳ DORA Art. 28(8): Tested exit strategies · ↳ NIS2: Implemented risk management with evidence · ↳ EU CSF: SEAL scoring

The Loop — Governance is Continuous

Governance evidence feeds back into policy refinement. Drift patterns identify where policies need tightening. New regulations trigger policy updates. The lifecycle is continuous — not a one-time implementation but an operating model.

01
DEFINE
Policy as Intent
Regulatory requirements → enforceable rules
You demonstrate planning
02
CLASSIFY
Assign workloads to tiers
Workload characteristics → governance tier
You demonstrate workload insight
03
DEPLOY
Enforcement at placement
Policy-gated deployment → right workload, right place
You demonstrate control
04
GOVERN
Evidence as Output
Continuous monitoring → audit-ready proof
You demonstrate compliance