Back

Innovations for cloud sovereignty at the AWS Summit 2024

Image Slider

April 24, 2024

A look back at AWS Summit Paris 2024, the event that brings together the cloud computing community to showcase the latest innovations from AWS.

A look back at AWS Summit Paris 2024, the event that brings together the cloud computing community to showcase the latest innovations from AWS. David NEYRON, DevOps/Cloud Engineer, and Lionel GAIROARD, DevSecOps Practice Leader, were there to gather the latest information on cloud sovereignty, AI, and data. They share their feedback and inspiration from this day dedicated to expertise. Let's start with David, who asks us about the digital sovereignty of the cloud and the trust we can place in providers.

 

Digital sovereignty in the cloud

" In any case, Americans can see everything that happens in the cloud. They have access to it under the Patriot Act, so I'm telling you, we won't be able to put our data there anytime soon," Jean-Michel exclaimed this morning at the coffee machine.

Upon further investigation, it becomes apparent that Jean-Michel is not the only one concerned about what is referred to as the digital sovereignty of the cloud.

So, is this concern justified? If so, are there solutions available to keep our data private? The answer lies in elements of theAWS Summit 2024.

The topic of cloud digital sovereignty is not new. But first, what do we mean by that? To put it simply, it can be broken down into two parts:

Data sovereignty

When working in the cloud, we store and use data, some of which may be sensitive, on infrastructure that does not belong to us. We are therefore entitled to have doubts about the location of our data, how it is used, and how it is encrypted.

If they are, are they in transit? Or "at rest"? Do cloud employees have access to our data? 

Operational sovereignty.

As mentioned above, the infrastructure we use does not belong to us. This raises questions about its resilience, independence, and the jurisdiction that applies depending on the location of the equipment, etc.

These two notions are encompassed by the general concept of cloud digital sovereignty. And the questions it raises are all the more important when it comes to sensitive personal data such as health or banking data, for example. With the cloud being used more and more by businesses, it is becoming crucial for customers to consider the digital sovereignty of these public clouds.

SecNumCloud

To address these issues, certain countries, including France, have legislated to regulate cloud usage by creating, among other things, a SecNumCloud label . This label is a set of requirements that must be met in order to be selected by public or private entities wishing to outsource the processing and storage of their sensitive data.

Among the various technical requirements, such as data localization within the European Union, some aim to establish protection against non-European law by requiring that " the provider's registered office, central administration, and principal place of business must be located within a Member State of the European Union."

Oh dear... So Jean-Michel was right? If we protect ourselves with laws like these, does that mean that the major players in the American cloud can really see everything and our data in the cloud will never be secure? Actually, it's a little more complicated than that.

What is very concrete, however, is the market that the European Union represents for these American cloud players: nearly $58 billion in 2024. So, faced with such prospects for profit, it is not really in the interest of the American cloud giants to provide our data to their government, but rather to appease the demands of states and their customers, as well as Jean-Michel, in order to reassure them. In concrete terms, this represents a lot of technical innovations, some of which were presented at the AWS Summit 2024:

 

  1. Enhanced security for virtualization.

On a traditional virtualization infrastructure, the various hypervisor components required for virtualization are often located on the same physical hardware, thus sharing a common attack surface. AWS has chosen to separate its components onto dedicated physical media, thereby reducing the risk of compromising the entire hypervisor, which is no longer a single instance but a multitude of dedicated physical cards isolated from one another. This is the AWS Nitro system.

  1. A high level of infrastructure monitoring and control.

With the ControlTower service and its connectivity to other services such as CloudTrail and CloudFormation, AWS offers to prevent, detect, and, if necessary, remove the use of resources that may pose a security risk.

  1. XKS by KMS.

KMS, AWS's encryption key management service, now offers XKS, an external encryption hardware control service. This involves transferring responsibility for storing encryption keys to another provider who can more easily meet the applicable legal requirements. AWS then acts solely as an intermediary, eliminating the possibility of AWS reading the encrypted data since it no longer holds the keys.

However, be careful with shared responsibility models if you decide to take full responsibility for encryption. With this level of outsourcing, AWS cannot be held liable in the event of problems.

AWS Dedicated Local Zones

This infrastructure is managed by AWS and reserved for the exclusive use of the customer. It can be located to meet regulatory requirements and managed by local AWS personnel, again to comply with legal constraints.

AWS infrastructure tailored to specific regulations

Like the AWS regions announced in Germany for 2025, these regions are not dedicated local regions like the ones we described earlier, but they still meet very specific criteria to satisfy the requirements of certain laws. The resilience and security guarantees are the same as for traditional AWS regions, but they are located where regulations require. They will have their own IAM instances, their own account system, their own consumption tracking, etc.

The question of trust

In summary, these areas have certain characteristics that enable them to meet special safety requirements.

It is thanks to all these technical innovations that big names in the cloud such as AWS are trying to reassure their customers in order to regain as much market share as possible and thus increase their profits.

However, even though Jean-Michel feels somewhat reassured on the subject because he understands that it is not in the interest of cloud providers to open up access to his data, the fact remains that despite all the measures put in place by these cloud players, legal bodies, and customer security policies, sensitive data is entrusted to third parties, on whom trust is ultimately placed.

We will therefore leave this last parameter to the discretion of each individual.

 

David NEYRON

DevOps/Cloud Engineer

SAMLv2, OpenID Connect, etc.: Everything you need to know about the different SSO protocols cover
June 13, 2024

SAMLv2, OpenID Connect, etc.: Everything you need to know about the different SSO protocols

Discover the main SSO protocols and their crucial roles in securing ...
Learn more
IAM: Identity Management and Administration cover
June 6, 2024

IAM: Identity management and administration

Let's share an overview of the field of identity management and administration...
Learn more
Decoding the LPM, NIS2, and NIST2 regulations cover
May 22, 2024

Decoding the LPM, NIS2, and NIST2 regulations

Focus on the LPM, NIS2, and NIST2 regulatory frameworks with Guillaume Turcas, E...
Learn more
DevOxx France 2024: Exploring AI and technical challenges in DevSecOps cover
May 16, 2024

DevOxx France 2024: Exploring AI and technical challenges in DevSecOps

Feedback from DevOxx France 2024 by Lionel Gairoard: the AI revolution...
Learn more
Create a sandbox environment for Azure ARC cover
April 10, 2024

Create a sandbox environment for Azure ARC

Create your Azure ARC sandbox with Jumpstart Arc Box.
Learn more
Microsoft Defender EASM: see your IT system through the eyes of a hacker cover
04/03/2024

Microsoft Defender EASM: see your IT system through the eyes of a hacker

Matthieu GAILLARD-MIDOL, Practice Leader SecOps & CloudSec, shares his thoughts...
Learn more
Azure confidential virtual machines cover
March 20, 2024

Azure confidential virtual machines

Enhancing cloud security is one of the main challenges facing businesses...
Learn more
Sign&Go: the French access management tool cover
February 28, 2024

Sign&Go: the French access management tool

Paul Bresnu, cybersecurity expert, presents Sign&Go, the access management tool...
Learn more
How I became addicted to ChatGPT and then scared of it cover
February 22, 2024

How I became addicted to ChatGPT and then scared of it

The discovery My discovery of OpenAI's API marked...
Learn more