AWS EBS EU Alternatives 2026: Block Storage Without CLOUD Act Exposure

AWS Elastic Block Store (EBS) is the default block storage layer for EC2 instances and many containerised workloads running on AWS in Europe. The typical setup — EBS volumes in eu-west-1 or eu-central-1, encrypted with an AWS KMS key — appears GDPR-compliant at first glance. The data doesn't leave the EU region. The volume is encrypted. The access logs are in CloudTrail.

The problem is subtler: the encryption keys are managed by AWS KMS, an American company subject to US law, and EBS snapshots replicate into S3 under the same jurisdiction constraints. When EU developers treat "encrypted EBS in eu-west-1" as a data sovereignty solution, they are conflating encryption at rest with control over decryption — and under GDPR, those are not the same thing.

This post explains the specific legal gaps in the standard EBS setup and the EU-native block storage alternatives that close them.


What AWS EBS Actually Gives You

EBS provides persistent block-level storage volumes that attach to EC2 instances. In practice, EBS is used for:

AWS recommends encrypting EBS volumes using AWS KMS. Encryption is enabled by default in modern account configurations, using either the AWS-managed key (aws/ebs) or a customer-managed key (CMK) that you create in KMS.

The AWS documentation correctly states that the encryption is performed at the hypervisor level — data is encrypted before it leaves the EC2 host and never hits the network in plaintext. For technical security, this is solid.


The CLOUD Act Problem With AWS KMS

The CLOUD Act (Clarifying Lawful Overseas Use of Data Act, 2018) allows US law enforcement to compel US-based cloud providers to produce data stored on servers anywhere in the world, including servers located in the EU. This applies regardless of where the data is physically stored — what matters is where the company is incorporated.

AWS is a US company (Amazon Web Services, Inc., incorporated in Delaware). Its KMS service is subject to the CLOUD Act regardless of which region your KMS keys are configured in.

What this means in practice:

When you encrypt an EBS volume with an AWS KMS key — even a CMK you created — AWS holds the key material in its KMS infrastructure. If the US government issues a valid CLOUD Act order targeting AWS, AWS can be required to use that key material to decrypt your data. You would not necessarily be notified. The order can include a gag provision prohibiting AWS from informing the data owner.

This is not a theoretical scenario. CLOUD Act warrants have been issued against major cloud providers, and the existence of active orders is typically confirmed only through court proceedings — long after the access occurred.

The GDPR Art. 32 Implication

GDPR Article 32(1)(a) requires "the pseudonymisation and encryption of personal data" as part of appropriate technical measures. But the EDPB's 2021 Recommendations on supplementary measures for data transfers (Rec. 01/2020) make clear that encryption only qualifies as an effective safeguard if the controller holds the keys. If a third party (here, AWS) can be legally compelled to use the keys without your knowledge, the encryption does not provide the protection GDPR Art. 32 contemplates.

The Schrems II ruling (C-311/18, July 2020) established that US surveillance law — including FISA Section 702 and Executive Order 12333 — creates a risk incompatible with EU fundamental rights. The CLOUD Act adds a separate vector: law enforcement access to cloud-stored data via provider compulsion, without requiring the provider's customer to be notified or have standing to challenge the order.


EBS Snapshots: The Data Transfer You Didn't Know About

EBS snapshots are stored in Amazon S3 in the same region as the volume. This appears safe — your data stays in eu-west-1. But snapshots stored in S3 are subject to the same AWS/CLOUD Act jurisdiction as everything else in your AWS account.

More specifically, when you copy an EBS snapshot to another region — a common disaster recovery practice — the data crosses AWS's internal network. Cross-region snapshot copies are performed by AWS infrastructure and are not subject to your VPC routing controls. The data briefly exists in AWS's internal transfer layer, which is under US jurisdiction.

For GDPR purposes, copying an EBS snapshot from eu-west-1 to us-east-1 for backup purposes is a data transfer to a third country under Art. 44. If no valid transfer mechanism exists (standard contractual clauses with AWS do not remedy the CLOUD Act exposure under current EDPB guidance), this transfer may be unlawful.

Note: Cross-region snapshot copies to other EU regions (e.g., eu-west-1 to eu-central-1) are less clear-cut, since both source and destination are within the EU. However, the underlying infrastructure performing the copy remains US-controlled.


EU-Native Block Storage Alternatives

The following providers offer block storage with EU incorporation, no US parent company, and no CLOUD Act exposure.

Hetzner Block Volumes

Hetzner Online GmbH is a German company (Gunzenhausen, Bavaria) with 100% German ownership — no US parent company, no CLOUD Act exposure.

Hetzner Block Volumes:

For most EC2+EBS workloads, migrating to Hetzner Cloud with Block Volumes is a direct architectural substitution: Hetzner Cloud Server replaces EC2, Block Volume replaces EBS.

Scaleway Block Storage SSD

Scaleway SAS is a French cloud provider (subsidiary of Iliad Group), incorporated in France with no US parent company.

Scaleway Block Storage SSD:

OVHcloud Block Storage

OVH SAS is a French company (Roubaix) with no US parent company. OVHcloud is the second-largest European cloud provider by revenue.

OVHcloud Block Storage:

gridscale Block Storage

gridscale GmbH is a German company (Cologne) providing block storage as part of their cloud platform.


The Kubernetes/Container Case: Why PaaS Avoids the Problem Entirely

A significant subset of EBS use cases — persistent volumes for stateless containerised applications — can be eliminated entirely by moving to a EU-native PaaS instead of self-managed EC2+Kubernetes.

When you run a containerised application on a PaaS layer, the platform abstracts storage management. Your application code runs in containers without needing direct EBS-equivalent block storage for application state. Databases are provided as managed services (Postgres, Redis) where the storage layer is fully managed by the EU-native PaaS operator.

This changes the GDPR posture significantly:

For teams migrating off AWS EC2+EBS, the decision tree is:

  1. Database workloads on EBS → migrate to managed Postgres/MySQL/Redis on an EU-native PaaS
  2. Stateless application code on EBS root volumes → containerise and deploy to EU-native PaaS
  3. Large file/object storage on EBS → evaluate Hetzner Object Storage or Scaleway Object Storage as S3-compatible EU alternatives
  4. Stateful legacy applications requiring raw block storage → Hetzner Block Volumes or Scaleway Block Storage SSD

EBS Encryption Key Rotation and GDPR Art. 17

One EBS management task that creates hidden GDPR complexity is key rotation with CMKs. When you rotate an AWS KMS CMK used for EBS encryption, AWS re-encrypts the volume's data key (DEK) but does not re-encrypt the volume data itself. This means:

EU-native block storage providers operating without US regulatory exposure do not have this legal-hold complication — key deletion under their jurisdiction is subject only to EU commercial law requirements.


Practical Migration Checklist

For teams moving from AWS EBS to EU-native block storage:

Phase 1: Inventory

Phase 2: Data classification

Phase 3: Migration

Phase 4: Compliance verification


Summary

AWS EBS in EU regions provides technical encryption but not data sovereignty. The key management infrastructure (AWS KMS) is a US company subject to CLOUD Act compulsion, and EBS snapshots carry DR-copy patterns that can trigger GDPR Art. 44 cross-border transfer obligations.

EU-native alternatives — Hetzner Block Volumes, Scaleway Block Storage SSD, and OVHcloud Block Storage — provide equivalent technical capabilities without US jurisdiction over key management or data access. For containerised workloads, moving to a EU-native PaaS eliminates the raw block storage layer entirely, simplifying both the architecture and the GDPR compliance posture.

The migration effort is measurable and bounded. The compliance gap with AWS KMS-encrypted EBS is structural and cannot be fixed by configuration alone.