2026-05-18·5 min read·sota.io Team

Cloudflare CDN + WAF EU Alternative 2026: CLOUD Act Risk in Your Edge Network

Post #1 in the sota.io EU CDN + WAF Serie

Cloudflare CDN WAF EU Alternative 2026 — CLOUD Act risk in your edge network, EU-native alternatives BunnyNet Gcore CDN77

Cloudflare is everywhere. Over 20% of the web uses it. But Cloudflare Inc. is a Delaware corporation, headquartered in San Francisco — and that means your CDN access logs, WAF rule hits, Bot Management scores, and DDoS mitigation data all sit on infrastructure controlled by a company that the US government can compel to disclose information under the CLOUD Act and FISA Section 702, without notifying you or your EU users.

This post is not about Cloudflare Workers and edge computing — we covered that separately. This is about Cloudflare's core CDN, WAF, DDoS Protection, and Bot Management products — the services that most EU companies use without realizing they create a GDPR transfer problem.


Why CDN Data Is Personal Data Under GDPR

The most common misconception: "Cloudflare just caches static files — there's no personal data involved."

This is wrong. Under GDPR Art. 4(1), an IP address is personal data whenever it can be linked to an identified or identifiable natural person. Your CDN access logs contain:

Cloudflare's Access Log format includes all of these. If you enable Cloudflare Logs (available on Pro plans and above), this data is stored in Cloudflare's infrastructure — which is a US entity.

The Schrems II Trap

Under Schrems II (C-311/18, July 2020), Standard Contractual Clauses (SCCs) alone are not sufficient for transfers to the US if US surveillance law renders the protections illusory. The EDPB's recommendations (01/2020) require a Transfer Impact Assessment (TIA) that honestly evaluates:

  1. Is the importer subject to US surveillance laws? → Yes (FISA 702, CLOUD Act, NSL authority)
  2. Can the US government access the transferred data? → Yes
  3. Do EU data subjects have effective judicial redress in the US? → No (FISA Court is secret)

For Cloudflare specifically: they received 3,078 legal demands in H2 2023 alone (per their transparency report), including national security requests with gag orders. The very fact that they publish a transparency report confirms they receive — and comply with — US government data requests.


Cloudflare's CLOUD Act Risk Matrix

CLOUD Act Score: 20/25

DimensionScoreEvidence
US entity (Delaware Corp)+4Cloudflare Inc., 101 Townsend St, San Francisco, CA
NSL/FISA 702 confirmed+4Transparency report: National Security Letters received
Government contracts+3Cloudflare for Government (FedRAMP Moderate in progress), DoD partnerships
CDN logs = personal data+3IP + UA + timestamp + URL in access logs (GDPR Art.4(1))
WAF behavioral data+2Rule hits, attack signatures linked to user IPs
Bot Management profiling+2Cross-site user behavior scores (GDPR Art.22 profiling)
DDoS mitigation metadata+1L3/L4/L7 attack data with EU user IP exposure
Transparency report-1Partial credit for disclosure (still complies with orders)
Total20/25HIGH RISK

Compare this to the EU-native alternatives below (BunnyNet: 0/25, Gcore: 1/25, CDN77: 1/25).


The Four GDPR Problem Areas

1. CDN Access Logs (GDPR Art. 4(1) + Art. 28)

Cloudflare's CDN generates access logs for every request. On Free/Pro plans, these logs are accessible via the dashboard. On Business/Enterprise, they can be forwarded via Logpush to your own storage — but the logs originate on Cloudflare's US-controlled infrastructure before forwarding.

GDPR Art. 28 implication: Cloudflare is your data processor for CDN log data. Their DPA (Data Processing Addendum) includes SCCs, but your TIA must assess whether those SCCs provide real protection given CLOUD Act / FISA 702 authority.

What EDPB says: If your TIA concludes that US surveillance law makes protection illusory, you cannot rely on SCCs alone. You need supplementary measures (encryption, pseudonymization) — but Cloudflare processes plaintext HTTP traffic for WAF to function. You cannot encrypt what you need Cloudflare to inspect.

2. WAF Rule Hits = Behavioral Profiling (GDPR Art. 22)

Cloudflare WAF operates at L7 — it inspects the content of HTTP requests. When a WAF rule fires:

Under GDPR Art. 22, automated decision-making that produces legal or significant effects on individuals requires explicit consent or a legal basis. A WAF block is exactly this: an automated decision (block/challenge) based on behavioral analysis of an EU user's HTTP request.

If Cloudflare's WAF blocks a legitimate EU user because their request pattern matched an attack signature, that's an automated decision without human review. Article 22(3) gives users the right to human review — but you can't exercise that right if you don't know Cloudflare is the decision-maker.

3. Bot Management = Cross-Site Profiling (GDPR Art. 22 + Recital 71)

Cloudflare Bot Management goes further than WAF. It assigns a Bot Score (0-100) to every request, derived from:

That last point is the GDPR Art. 22 land mine. Cloudflare's Bot Score for your EU user is influenced by how that user's IP/fingerprint behaved on other websites also protected by Cloudflare. This is cross-site behavioral profiling — exactly what GDPR Recital 71 targets.

The EU user has no idea Cloudflare is profiling their behavior across the web. They visited your site, not Cloudflare. There's no transparency obligation fulfilled, no consent obtained.

4. DDoS Mitigation Data (GDPR Art. 25 — Data Minimisation)

During L3/L4 DDoS attacks, Cloudflare's network captures packet-level data including:

GDPR Art. 25 (Data protection by design and by default) requires that data processing is minimized to what is necessary. Cloudflare's DDoS mitigation necessarily captures more data than the minimum — it needs traffic samples to distinguish attack from legitimate traffic.

The problem: this data flows to and is processed by a US entity with FISA/CLOUD Act exposure. There's no technical supplementary measure that lets Cloudflare both protect against DDoS and keep the data beyond US government reach.


EU-Native CDN + WAF Alternatives

BunnyNet — 0/25 CLOUD Act Risk ⭐

Bunny.net d.o.o. — Ljubljana, Slovenia. Founded 2012. EU-incorporated, no US parent, no US VC (bootstrapped). GDPR-native by design.

FeatureCloudflareBunnyNet
CLOUD Act Score20/250/25
CDN Pricing$0.008–0.05/GB€0.005–0.01/GB
WAFIncluded Pro+BunnyShield (add-on)
DDoS ProtectionL3/L4/L7 FreeL3/L4 included
Bot ManagementEnterpriseLimited
EU Data ResidencyNo (US control plane)Yes
Transparency ReportYes (US-law compelled)N/A (no government orders)

BunnyNet strengths:

BunnyNet limitations:

Best for: EU companies that need CDN + basic WAF without US jurisdiction. Cost-effective replacement for Cloudflare Free/Pro.

Gcore — 1/25 CLOUD Act Risk

G-Core Labs SA — Luxembourg. EU incorporated. Strong presence in CIS, EU, and gaming sector. Founded 2009.

FeatureCloudflareGcore
CLOUD Act Score20/251/25
CDN Pricing$0.008–0.05/GB$0.004–0.008/GB
WAFIncluded Pro+Included Enterprise
DDoS ProtectionL3-L7L3-L7 (1 Tbps capacity)
Bot ManagementYesBasic rules
EU Data ResidencyNoYes (Luxembourg HQ)

Gcore strengths:

Gcore limitations:

Best for: High-traffic EU companies needing serious DDoS protection + WAF without US jurisdiction. Good Cloudflare Enterprise alternative.

CDN77 / Datacamp — 1/25 CLOUD Act Risk

DataCamp Limited / Datacamp s.r.o. — Czech Republic / British Virgin Islands holding. Czech operational entity. Tier 1 peering, Prague datacenter focus.

FeatureCloudflareCDN77
CLOUD Act Score20/251/25
CDN Pricing$0.008/GB€0.006/GB
WAFIncludedLimited rules
DDoS ProtectionL3-L7L3-L4
Streaming CDNYesStrong (video CDN focus)

CDN77 strengths:

CDN77 limitations:

Best for: EU companies that need CDN-only without WAF — replace Cloudflare's CDN function while keeping WAF elsewhere.

Self-Hosted WAF: Coraza + Nginx/Caddy

If you need WAF without a CDN vendor, self-hosting gives you full control:

# Nginx + Coraza WAF (EU-native Hetzner server)
# coraza.conf
Include /etc/coraza/crs/crs-setup.conf
Include /etc/coraza/crs/rules/*.conf

SecRuleEngine On
SecRequestBodyAccess On
SecResponseBodyAccess Off

# EU server = EU jurisdiction = 0/25 CLOUD Act

Coraza (CNCF project, Apache 2.0) is a Go-native WAF engine compatible with OWASP CRS. Deploy on Hetzner (Nuremberg, Falkenstein, Helsinki) for full EU data sovereignty.

Cost comparison (100GB/month traffic, WAF included):


GDPR Compliance Requirements by Cloudflare Feature

Cloudflare FeatureGDPR RiskRequired Action
CDN (Caching)Medium — access logs = personal dataTIA + RoPA entry, consider log forwarding to EU storage
WAFHigh — behavioral data under US jurisdictionTIA required, consider EU-native WAF
Bot ManagementVery High — cross-site profiling (Art. 22)Explicit basis needed, consider dropping feature
DDoS ProtectionMedium — attack traffic metadataTIA + data minimization assessment
Cloudflare AnalyticsHigh — aggregated EU visitor data to USSwitch to Plausible Analytics (EU-native) or Fathom
Cloudflare Access (ZTNA)High — authentication events = personal dataHigh-risk TIA, consider Authentik (self-hosted)
Cloudflare TunnelMedium — traffic routing metadataTIA + assess if alternative routing possible
Cloudflare Email RoutingHigh — email metadata under US jurisdictionUse EU email provider (Posteo, Proton)

Migration Decision Framework

6-Dimension Assessment:

1. Traffic Profile
   → Static files only? → CDN77 or BunnyNet sufficient
   → Dynamic API traffic? → BunnyNet or Gcore with WAF
   → Mixed CDN + compute? → See Cloudflare Workers post for edge functions

2. WAF Requirements
   → Basic OWASP rules? → BunnyShield or self-hosted Coraza
   → ML-based bot detection? → Gcore or accept trade-off
   → Enterprise WAF (managed rules)? → Gcore or self-hosted ModSecurity

3. DDoS Threat Level
   → Standard web attack (L7)? → BunnyShield or Coraza adequate
   → Volumetric DDoS (L3/L4)? → Gcore (1 Tbps capacity) or upstream provider
   → State-level DDoS? → Gcore Enterprise or Tier 1 ISP scrubbing

4. EU Data Residency Need
   → Legal requirement (GDPR Art. 44)? → BunnyNet (0/25) or Gcore (1/25)
   → Contractual requirement (customer DPA)? → BunnyNet or self-hosted
   → Best practice only? → TIA documentation may suffice for Cloudflare

5. Engineering Capacity
   → Full DevOps team? → Self-hosted Coraza + BunnyNet
   → Small team, managed preferred? → Gcore or BunnyNet all-in-one
   → No CDN experience? → BunnyNet (simpler than Cloudflare)

6. Compliance Timeline
   → Audit in <3 months? → BunnyNet (fastest migration)
   → Greenfield? → Build EU-native from day one (BunnyNet + Coraza)
   → Legacy Cloudflare migration? → Phased: CDN first, WAF second

4-Week Migration Plan

Week 1 — Audit

Week 2 — Choose Replacement Stack

Week 3 — Parallel Run

Week 4 — DNS Cutover


GDPR Article Reference

ArticleRelevanceCloudflare Risk
Art. 4(1)IP addresses in CDN logs = personal dataHigh — all access logs are personal data
Art. 22Bot Management = automated profilingHigh — cross-site behavioral profiling
Art. 25Data protection by designMedium — US-entity CDN lacks by-design EU residency
Art. 28Processor obligationsHigh — DPA with US CLOUD Act carve-outs
Art. 30RoPA entry required for CDN processorAction required — add Cloudflare + replacement
Art. 44Transfer to third country (US)High — Cloudflare = US entity transfer
Art. 46(2)(c)SCCs as transfer mechanismPartial — TIA required under Schrems II
Recital 71Automated profiling transparencyHigh — Bot Management cross-site scores

Pricing Comparison (EU Traffic, 100GB/month)

ProviderCDNWAFDDoSTotalCLOUD Act
Cloudflare Free€0BasicL3-L7€020/25
Cloudflare Pro€20OWASP+L3-L7€20/mo20/25
BunnyNet + Shield~€0.50OWASPL3-L4~€5–15/mo0/25
Gcore CDN~€0.40EnterpriseL3-L7Custom1/25
CDN77~€0.60NoneL3-L4~€9/mo1/25
Hetzner CX22 + Coraza€4.51Full OWASP€4.51/mo0/25

Note: Self-hosted Coraza has no L3/L4 DDoS protection — pair with Hetzner's free DDoS filtering at network level.


Bottom Line

Cloudflare is an exceptional product — but it is a US entity with confirmed CLOUD Act and FISA 702 exposure. Every IP address your EU visitors send to Cloudflare's network becomes personal data under US jurisdiction.

For EU companies building GDPR-compliant infrastructure:

If your customers are asking "where is your CDN data processed?" — the answer with Cloudflare is "the United States." With BunnyNet or Gcore, it's "the European Union."


Part of the sota.io EU CDN + WAF Serie — tracking CLOUD Act exposure across the infrastructure tools EU companies use every day. See all posts in the series.

EU-Native Hosting

Ready to move to EU-sovereign infrastructure?

sota.io is a German-hosted PaaS — no CLOUD Act exposure, no US jurisdiction, full GDPR compliance by design. Deploy your first app in minutes.