Information Age 09月29日
数据主权的重要性及实现方法
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

随着地缘政治紧张和供应链不确定性增加,越来越多的英国IT领导者认为政府对美国云服务的依赖是数字经济的重大威胁。数据主权,即组织对其数据、数字基础设施和运营模式的全权控制,已成为确保透明度、业务连续性和独立行动能力的关键。实现数据主权并非一蹴而就,而是一个减少依赖、重新掌握关键决策的过程,需要从架构、运营和采购等方面做出深思熟虑的选择。组织需要全面评估现有依赖,包括数据位置、专有技术、封闭接口或对外部支持模式的依赖,并培养评估技术的能力,以确保在条件变化时仍能保持独立行动能力。

📚 数据主权是指组织对其数据、数字基础设施和运营模型的全权控制能力,它超越了简单的数据存储位置或法律管辖区问题,涉及技术、运营和战略等多个层面。

🔍 实现数据主权需要一个持续的过程,组织需要识别并减少对外部服务的依赖,评估现有技术栈中的专有技术、封闭接口等潜在风险,并建立内部能力来评估和管理这些依赖。

🚀 成功实现数据主权的组织通常会关注构建开放标准的系统、区域性锚定的运营模式,并确保合同中包含明确的退出条款或本地化支持,以便在条件变化时拥有更多灵活性和自主权。

🤝 数据主权并非意味着完全排斥外部解决方案,而是强调组织需要保持对外部技术的理解、管理和替换能力,确保在关键时刻能够独立决策,不受外部供应商的限制。

📈 数据主权已成为组织长期业务战略的关键要素,它有助于组织在日益复杂和不确定的数字环境中保持竞争优势,确保业务连续性和合规性,并最终实现可持续的业务增长。

By Mark Dando on Information Age - Insight and Analysis for the CTO

It’s in the nature of the modern digital economy that most organisations use digital technologies they don’t produce themselves.

A new study indicates that more than 60 per cent of UK IT leaders consider the government’s dependence on US cloud services to be a significant threat to the country’s digital economy, its own industry, and data security. That concern also highlights a broader question: when it comes to digital infrastructure, how regionally anchored and operationally specific must a strategy be to truly serve its stakeholders, especially compared to platform-driven models that may appear scalable, but often fail to meet what most customers need?

This deep-rooted dependency on external providers for critical infrastructure, software, and digital services exists at a time when geopolitical tensions and supply chain uncertainties pose a risk to operational resilience and long-term digital autonomy. At the same time, regulatory pressure is increasing. The introduction of NIS2, DORA, the Cyber Resilience Act (CRA) and the EU AI Act is driving organisations, particularly in regulated sectors, to re-examine how they manage data, digital infrastructure and operational control.

In this context, data sovereignty, or the ability of an organisation to retain full control over its data, digital infrastructure and operational models, is a bigger priority than ever. What was once viewed as a compliance issue is now a core requirement for ensuring transparency, business continuity and the ability to act independently based on a resilient IT infrastructure.

Common misconceptions around data sovereignty

Although the concept of sovereignty is subject to greater regulatory control, its practical implications are often misunderstood or oversimplified, resulting in it being frequently reduced to questions of data location or legal jurisdiction. In reality, however, sovereignty extends across technical, operational and strategic domains.

In practice, these elements are difficult to separate. While policy discussions often centre on where data is stored and who can access it, true sovereignty goes further. For example, much of the current debate focuses on physical infrastructure and national data residency. While these are very important issues, they represent only one part of the overall picture. Sovereignty is not achieved simply by locating data in a particular jurisdiction or switching to a domestic provider, because without visibility into how systems are built, maintained and supported, location alone offers limited protection.

Another common assumption is that adopting cloud or third-party platforms means relinquishing sovereignty when, in reality, it is eminently possible to leverage external technologies while maintaining control, provided systems are designed with these requirements in mind. The underlying point is that sovereignty is not about rejecting external solutions; it is about being able to understand, manage, and, where necessary, replace them on an organisation’s own terms.

Regaining control of your data sovereignty

So, where does this leave the many thousands of organisations looking to change course and take more active control over their data sovereignty?

The first point to address is that achieving is not a binary state, but a process of reducing dependency and regaining control over critical decisions. It requires deliberate choices across architecture, operations and procurement guided by a clear understanding of what must remain within the organisation’s control and why.

Reaching this point often hinges on conducting a comprehensive assessment of existing dependencies. These may lie not only in the location of data, but in proprietary technologies, closed interfaces or reliance on external support models. Part of the ongoing challenge is that many of these dependencies are deeply embedded, making them difficult to identify without a structured approach.

Sovereignty also depends on the ability to make independent decisions as circumstances change. That might mean moving to a new provider, meeting updated regulatory demands or addressing unforeseen risks without disrupting operations.

On a practical level, organisations that succeed in achieving tend to work toward a few common goals. Crucially, this doesn’t mean abandoning commercial platforms. Still, it does require clear-eyed scrutiny of dependencies that could constrain future flexibility or expose organisations to external legal jurisdictions, even when infrastructure appears locally hosted.

A second consideration is how decisions are made and sustained over time. Sovereignty is rarely achieved through one-off procurement or compliance exercises. It requires continuous attention to how systems are governed, who has access and whether the organisation can still act independently if conditions change.

Building this level of assurance often requires new internal capabilities, including the ability to evaluate technologies on more than cost or convenience alone, and to ask hard questions about transparency, interoperability and long-term viability. These questions may be technical, but the implications are strategic.

What good looks like

Organisations that take it seriously tend to focus less on technical purity and more on practical control. That means understanding which systems are critical to ongoing operations, where decision-making authority sits and what options exist if a provider, platform or regulation changes.

Clearly, there is no single approach that suits every organisation, but these core principles help set direction. Systems built on open standards, that are regionally anchored and operationally specific, for example, are easier to adapt, in-house knowledge makes it easier to challenge assumptions and contracts that include clear exit terms or support localisation, which offer more room to manoeuvre if and when circumstances change. For organisations that reach this point, sovereignty becomes much less of a compliance headache and instead can help define key elements of long-term business strategy.

Key takeaways

Mark Dando is GM for EMEA North at SUSE.

Read more

Ransomware payments to be banned – the unanswered questions – The government has announced a ban on ransomware payments from public sector organisations. We explore the loose ends to be tied

Driving business growth through effective productivity strategies – Productivity models are key to driving business growth and improving performance but the key is to be flexible and take a holistic view of the process

7 key strategies for MLops success – Here, we explain the main strategies for MLops (machine learning operations) success to help your organisation stay competitive

The post Making sense of data sovereignty and how to regain it appeared first on Information Age.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

数据主权 数字基础设施 云服务依赖 IT领导力 业务连续性 数据安全 合规性 开放标准 区域锚定
相关文章