2026-05-16·5 min read·sota.io Team

EU Cloud and AI Development Act (CADA): What Every EU Developer's Hosting Stack Must Change by May 27

Post #1089 in the sota.io EU Cloud Sovereignty Series

EU digital sovereignty: Europe map with hosting compliance checklist overlay

On May 27, 2026, the EU Commission formally presents the Cloud and AI Development Act — CADA — to the European Parliament. This is not a future-dated event. The legislative framework is agreed. The presentation triggers the countdown for industry alignment.

Most coverage focuses on the obvious affected sectors: GovTech, HealthIT, Fintech. But CADA's scope is broader, and the hosting implications touch every EU developer shipping to enterprise or regulated clients, every SaaS product storing personal data, and every startup building on US-headquartered cloud infrastructure.

This is the practical guide that does not exist yet: what CADA means for your hosting stack, who is actually affected, and what you need to audit before the compliance window closes.


What CADA Actually Is

CADA (EU Cloud and AI Development Act, Article 114 TFEU legal basis) is the EU's answer to the US CLOUD Act (18 U.S.C. §2713). Where the US CLOUD Act compels US-incorporated companies to produce data on any server worldwide at the US government's request, CADA establishes the EU's own framework for cloud sovereignty.

The core mechanisms:

1. Jurisdictional Segregation Requirements
CADA requires that cloud services storing or processing specific categories of EU data be operated by entities not subject to conflicting foreign legislation. The US CLOUD Act is the primary target: a Microsoft Azure EU Region is still subject to US government data demands because Microsoft Corp. is a Delaware corporation. CADA treats this as a compliance gap, not a mitigation.

2. EUCS Alignment (EU Cybersecurity Certification Scheme for Cloud Services)
CADA mandates EUCS certification as a procurement prerequisite for certain data categories. EUCS Level High explicitly excludes providers subject to foreign jurisdiction — this effectively disqualifies AWS, Azure, and GCP for the covered use cases unless they establish legally independent EU entities.

3. AI Infrastructure Restrictions
Separately from cloud storage, CADA restricts the use of AI training infrastructure subject to US jurisdiction for model training on EU-protected data categories. This affects ML workloads running on AWS SageMaker, Azure ML, and Google Vertex AI when training on EU personal data.

4. Transparency and Audit Rights
CADA requires cloud providers to disclose any foreign government data requests to EU supervisory authorities within 72 hours — a direct conflict with US NSL (National Security Letter) gag orders under 18 U.S.C. §2709.


Who Is Actually Affected

The GovTech/Fintech/HealthIT framing in most CADA coverage misses the downstream developer impact. Direct CADA coverage is sector-specific. But the contract cascade reaches much further.

Tier 1: Direct Coverage (explicit CADA scope)

SectorData CategoryCADA Threshold
Public Sector / GovTechGovernment administrative data, judicial recordsAll cloud services
Financial ServicesDORA Art.28 critical ICT servicesSystemically important providers
Healthcare / HealthITHealth data (GDPR Art.9 special category)All processing systems
Critical InfrastructureNIS2-covered entitiesICT services for essential services
Defence / SecurityEUCS Level High sensitive dataAll cloud storage

Tier 2: Indirect Coverage (B2B contract cascade)

If you build SaaS sold to Tier 1 organizations, your infrastructure becomes contractually subject to CADA via DPA (Data Processing Agreement) clauses. Large enterprise clients in finance, healthcare, and the public sector are already including CADA-alignment clauses in vendor contracts.

Practical test: If any of these are true, CADA affects your hosting decisions:

Tier 3: Market Signal (voluntary alignment)

Even outside direct scope, CADA is accelerating enterprise procurement requirements. By Q4 2026, EU-native hosting will become a standard vendor qualification criterion — not because CADA legally requires it, but because procurement teams are applying the same framework across all vendors as a risk management measure.


The CADA Compliance Stack Audit

Here is the systematic way to audit your current infrastructure for CADA exposure.

Step 1: Map Your Data Flows by Category

Personal Data (GDPR Art.6)
├── Standard PII → GDPR Art.28 DPA required → CADA indirect risk if US provider
├── Special Categories (Art.9) → High-risk → CADA direct coverage
│   ├── Health data → CADA Tier 1
│   ├── Biometric data → CADA Tier 1
│   └── Political opinions, religion → CADA Tier 1
Government Data
├── Any data on behalf of public authority → CADA Tier 1
└── Judicial records → CADA Tier 1
Financial Data
├── DORA-covered ICT services → CADA Tier 1
└── PSD2 payment data → CADA Tier 1 (financial sector clients)

Step 2: Map Provider Jurisdiction

For each infrastructure component, determine the controlling entity's legal jurisdiction:

ComponentYour ProviderHQ JurisdictionCLOUD Act Subject?CADA Risk
Compute / PaaSAWS / Azure / GCPDelaware, USAYesHigh
Container OrchestrationAWS EKS / Azure AKSDelaware, USAYesHigh
Managed DatabasesAWS RDS / Azure SQLDelaware, USAYesHigh
Object StorageAWS S3 / Azure BlobDelaware, USAYesHigh
Auth / IAMAuth0 (Okta) / Azure ADDelaware, USAYesHigh
Monitoring / LoggingDatadog / New RelicNew York / DelawareYesHigh
CDNCloudflareDelaware, USAYesMedium
EmailSendGrid (Twilio) / MailchimpDelaware / GeorgiaYesHigh
CI/CDGitHub ActionsCalifornia, USAYesMedium

Step 3: Calculate CADA Exposure Score

Each US-jurisdiction component that touches CADA-covered data categories adds exposure:

def cada_exposure_score(components: list[dict]) -> dict:
    """
    Rough CADA exposure assessment per component.
    Returns exposure level: CRITICAL / HIGH / MEDIUM / LOW
    """
    score = 0
    for c in components:
        if c['us_jurisdiction'] and c['touches_special_category_data']:
            score += 25  # CRITICAL: direct CADA Tier 1
        elif c['us_jurisdiction'] and c['touches_personal_data']:
            score += 10  # HIGH: GDPR + CADA indirect
        elif c['us_jurisdiction']:
            score += 3   # MEDIUM: jurisdiction risk only
    
    if score >= 50:
        return {'level': 'CRITICAL', 'cada_direct': True}
    elif score >= 20:
        return {'level': 'HIGH', 'cada_indirect': True}
    elif score >= 5:
        return {'level': 'MEDIUM', 'market_risk': True}
    return {'level': 'LOW'}

The CADA-Compliant Stack: What to Replace and With What

PaaS / Application Hosting (Your Biggest CADA Decision)

This is where CADA compliance starts or fails. If your application runs on AWS, Azure, or GCP, every database call, every log line, every authentication event flows through US-jurisdiction infrastructure.

What to replace AWS / Azure / GCP Managed PaaS with:

RequirementEU-Native OptionJurisdictionEUCS Status
Managed PaaS (Railway/Render equivalent)sota.ioEU-incorporatedEU-only data centers
App Hosting + Managed DatabasesHetzner CloudGermanyIn progress
Kubernetes-as-a-ServiceOVH Managed KubernetesFranceEUCS L1
Serverless / Edge FunctionsBunny.net (edge)SloveniaEU jurisdiction
Full Managed CloudScalewayFranceEUCS candidate
Enterprise CloudDeutsche Telekom Open Telekom CloudGermanyEUCS Level High

What makes sota.io specifically CADA-relevant: sota.io is EU-incorporated, runs exclusively on EU-jurisdiction infrastructure, and does not subcontract to US-headquartered providers. There is no CLOUD Act hook. For developers moving away from Railway, Render, or Fly.io (all Delaware corporations), sota.io provides equivalent managed PaaS functionality without the US jurisdiction exposure.

Database / Persistence

ReplaceWith
AWS RDSManaged PostgreSQL on Hetzner (ClusterControl) or Scaleway
Azure SQLEclipseDB (Germany) or TimescaleDB EU-hosted
MongoDB Atlas (US)Ferretdb on EU PaaS + Hetzner storage
Firebase / FirestoreSupabase EU-region (note: verify entity jurisdiction)

Authentication / IAM

ReplaceWith
Azure AD / Entra IDKeycloak (self-hosted on EU PaaS), Zitadel (Swiss, CAOS AG)
Auth0 (Okta)Authentik (open-source, self-hosted), WALLIX Authenticator
AWS CognitoOry Kratos + Hydra (self-hosted)

Observability / Logging

ReplaceWith
DatadogGrafana Cloud EU-region (verify entity), self-hosted Prometheus + Grafana
New RelicSIGNL4 (German), self-hosted OpenTelemetry stack
AWS CloudWatchLoki + Grafana on EU infrastructure
SplunkGraylog (open-source, self-hosted)

Email Delivery

ReplaceWith
SendGrid (Twilio)Brevo (France, EU-incorporated)
Mailchimp (Intuit)Mailpit + self-hosted, CleverReach (Germany)
AWS SESPostmark EU? (verify), Scaleway Transactional Email

CI/CD

ReplaceWith
GitHub Actions (Microsoft)GitLab CI (GitLab B.V., Netherlands), Woodpecker CI self-hosted
AWS CodePipelineForgejo + Drone CI on EU infrastructure

The CADA Timeline: What Happens When

DateEventDeveloper Action Required
May 27, 2026EU Commission presents CADAFormal kickoff of legislative process
Q3 2026Parliament committee reviewTrack amendments affecting scope
Q4 2026First EUCS Level High certifications expectedBegin vendor qualification updates
H1 2027CADA transposition deadline (estimated)Compliance mandatory for Tier 1
2027 ongoingEnterprise procurement shiftsTier 2/3 market pressure intensifies

Why act now rather than after formal transposition?

Three reasons:

  1. Enterprise contracts move first. Large financial and public sector clients are already writing CADA-alignment requirements into 2026 vendor contracts. If you are in a 12-month enterprise sales cycle, your stack decisions today determine whether you qualify for Q4 2026 procurement.

  2. Migration time is the long pole. A typical app migration from AWS to EU-native PaaS — audit, data migration, DNS cutover, testing — takes 4–8 weeks for small teams, 3–6 months for complex systems. Starting post-transposition means missing the first wave of compliant-vendor deals.

  3. Competitive differentiation window. EU-native hosting is currently a differentiator. Post-2027, it will be a baseline requirement. Moving now captures the "EU-native" marketing positioning before competitors. After the deadline, no one awards points for compliance — it is just the minimum.


The Developer Compliance Checklist (May 27 Edition)

Copy this into your sprint board:

CADA COMPLIANCE CHECKLIST — Pre-Legislation Baseline

Infrastructure Audit
[ ] Map all cloud providers by legal entity jurisdiction
[ ] Identify which data categories each provider touches
[ ] Score CADA exposure (use framework in Step 3 above)
[ ] Document sub-processors in current DPA

Data Classification
[ ] Tag all data stores by GDPR category (Art.6 / Art.9)
[ ] Flag Art.9 special categories touching US-jurisdiction storage
[ ] Identify government client data flows (Tier 1 direct coverage)

Migration Planning
[ ] Prioritize highest-exposure components for migration
[ ] Select EU-native PaaS for application hosting
[ ] Select EU-native managed database
[ ] Replace US-jurisdiction auth/IAM
[ ] Replace US-jurisdiction observability stack

Contract Review
[ ] Review enterprise DPAs for CADA-forward clauses
[ ] Update sub-processor list in own DPA
[ ] Add EU-jurisdiction guarantee to client-facing DPA

Documentation
[ ] Create Technical Compliance Map (data flow + jurisdiction per component)
[ ] Note EUCS certification status for each new EU provider
[ ] Set calendar reminder: Q3 2026 Parliament committee updates

CADA and NIS2 / DORA: The Triple Compliance Problem

Many developers are already navigating NIS2 (Network and Information Security Directive 2) and DORA (Digital Operational Resilience Act). CADA creates a triple compliance challenge because the three frameworks have overlapping but non-identical cloud requirements:

RequirementNIS2DORACADA
ICT supply chain due diligenceArt.21(2)(d)Art.28(4)Implicit
Data residencyNo explicit requirementNo explicit requirementJurisdiction-based
Foreign law conflictNot addressedArt.28(9) third-country riskCore focus
Incident notification24h → 72h24h → 72h72h (government requests)
Audit rightsLimitedArt.30Art.X transparency
EUCS alignmentRecommendedRecommendedMandated (Tier 1)

The practical triple compliance stack:

For a FinTech building on EU infrastructure:

If your ICT provider is AWS, Azure, or GCP, you cannot satisfy all three simultaneously for Tier 1 data categories. EU-native PaaS is the solution that works across all three frameworks.


What sota.io Provides

sota.io is a EU-native managed PaaS that runs exclusively on EU-jurisdiction infrastructure. For developers migrating away from Railway, Render, Fly.io, or direct AWS/GCP deployment:

If you are building for enterprise clients who will require CADA alignment in their procurement by Q4 2026, deploying on sota.io now means your stack is already compliant when the first DPA clause hits your inbox.

Explore sota.io EU-native PaaS →


The Bottom Line

CADA is not a far-future event. The May 27 presentation marks the start of the enterprise procurement shift that will make EU-native hosting a standard vendor requirement over the next 18 months.

For developers, the practical action is the same regardless of whether your specific use case is in CADA's direct scope: audit your hosting stack against US jurisdiction exposure now, identify the highest-risk components, and migrate to EU-native alternatives before the enterprise procurement window closes.

The migration is not technically difficult — EU-native managed PaaS has reached parity with US alternatives. The difficulty is organizational inertia. Starting the audit today means completing it before your first enterprise client sends you a CADA-aligned vendor questionnaire.


CADA Resources

EU-Native Hosting

Ready to move to EU-sovereign infrastructure?

sota.io is a German-hosted PaaS — no CLOUD Act exposure, no US jurisdiction, full GDPR compliance by design. Deploy your first app in minutes.