With the C3A (Criteria enabling Cloud Computing Autonomy), the Federal Office for Information Security (BSI) has introduced a pioneering framework that serves as a new "Sovereignty Checklist." It allows organizations to objectively evaluate the sovereignty characteristics of cloud services and ensure digital self-determination.
This raises questions about digital sovereignty, particularly regarding cloud services. With the C3A (Criteria enabling Cloud Computing Autonomy), the Federal Office for Information Security (BSI) has introduced a pioneering framework.
“The C3A provide transparency, guidance, and the ability to select cloud services based on criteria relevant to the specific use case.” - Claudia Plattner, BSI President
Shared Responsibility and C3A vs. C5
Choosing cloud services is based on the Shared Responsibility Model, which limits the scope of decisions customers can make independently.
While security properties are addressed in the BSI's Cloud Computing Compliance Criteria Catalogue (C5), C3A allows organizations to evaluate whether a cloud offering can be used autonomously within their specific risk context.
- C5 (Security): Focus on operational security properties and compliance standards.
- C3A (Autonomy): Focus on the ability to act independently of the cloud provider’s influence and strengthening operational autonomy.
The Six Sovereignty Domains of C3A
The C3A framework divides requirements into six core domains (SOV-1 to SOV-6) that define and measure the degree of autonomy:
Focus on jurisdiction (EU/DE), registered headquarters, and effective corporate control by EU entities to limit external influence.
Ensuring audit rights for national authorities and mechanisms for taking over assets in the event of a state of defense.
Control over storage locations (residency), integration of external Key Management Systems (BYOK), identity providers, and client-side encryption.
EU residency of operating personnel, local SOC capabilities, and the technical ability for a complete network disconnect from non-EU connections without service interruption.
Transparency via Software Bill of Materials (SBOM), hardware dependencies, and proactive management of export restrictions.
Ensuring source code availability in the EU and the capability for independent maintenance and patching without third-party reliance.
Note: The areas of SOV-7 (Security & Compliance) are already covered by the C5 catalogue, while SOV-8 (Environmental Sustainability) is not within the BSI's primary framework scope.
What does this mean for companies?
For companies, the C3A catalogue provides an objective basis for translating the often abstract concept of "cloud sovereignty" into tangible business decisions:
- Informed Risk Management: Organizations can specifically evaluate how much they depend on the technological and operational roadmap of a single provider.
- Strategic Flexibility: Criteria such as SOV-6 (Technology) ensure that exit strategies exist not just on paper, but remain technically feasible.
- Future-proof Compliance: In highly regulated industries (e.g., critical infrastructure or healthcare), C3A helps proactively address regulatory requirements for resilience and autonomy.
- Mitigating Vendor Lock-in: Transparency regarding dependencies allows for planning multi-cloud strategies or hybrid approaches based on valid data.
To-dos for companies:
- Inventory: Identify critical cloud workloads where autonomy represents a business-critical risk.
- Utilize C3A Checklist: Use the catalogue as a template for your next risk assessment or cloud procurement.
- Contract Review: Check existing contracts for audit rights (SOV-2) and control options over storage locations (SOV-3).
- Architecture Review: Evaluate technical sovereignty features such as External Key Management (BYOK) or exit scenarios.
Structure and Application
The C3A framework is divided into base and supplementary criteria. Depending on criticality, cloud customers can decide which criteria to apply (e.g., localization of data centers or the origin of operating personnel).
The criteria are aligned with the European Cloud Sovereignty Framework (EU CSF) and require the cloud provider to already fulfill C5 criteria. In the future, the BSI will publish a guide for C3A audits to standardize proof of compliance, similar to the C5 attestation process.
While the framework is not (yet) legally binding, it is expected to become the standard for future tenders and security requirements. Cloud providers can prove compliance through standardized audits, while customers use it as a precise instrument for risk assessment and securing strategic independence.
Conclusion
C3A provides the necessary transparency to evaluate cloud services not only based on security (C5), but specifically regarding the degree of digital sovereignty and autonomy. They are thus an essential building block for strategic independence in a connected world.
Resources
Download C3A - Criteria enabling Cloud Computing Autonomy (PDF)

