2026-05-16·5 min read·sota.io Team

EU Cloud Sovereignty Certification 2026: EUCS Levels Explained for Developers

Post #1092 in the sota.io EU Cloud Sovereignty Series

EU Cloud Sovereignty Certification EUCS Levels Explained

Cloud certifications are supposed to make procurement decisions easier. In practice, EUCS — the EU's Cybersecurity Certification Scheme for Cloud Services — has become a flashpoint for exactly the question developers and compliance teams care most about: does a certified cloud provider still hand your data to US authorities?

The answer is nuanced, and getting it wrong costs you. This guide decodes EUCS assurance levels (Basic, Substantial, High), explains what the ongoing sovereignty debate removed from the original scheme, and gives you a practical checklist for evaluating any cloud provider's actual compliance posture — not just their marketing claims.


What Is EUCS and Why Does It Exist

EUCS is the EU's framework for certifying the cybersecurity posture of cloud services. It was developed by ENISA (European Union Agency for Cybersecurity) under authority granted by the EU Cybersecurity Act (Regulation EU 2019/881, effective 2019, with certification schemes rolling out through 2024–2026).

Before EUCS, cloud security certifications were fragmented across member states. Germany had BSI C5. France had SecNumCloud. The Netherlands, Spain, and other member states had their own criteria. A cloud provider certified in Germany had to repeat the entire audit process in France. EUCS aims to create mutual recognition across the EU so that a High-level certification is valid everywhere.

The scheme covers three cloud delivery models:

Each model has tailored requirements at each assurance level, reflecting the different attack surfaces and responsibilities in the shared responsibility model.


The Three EUCS Assurance Levels

Level 1: Basic

Target use cases: Low-sensitivity data, internal tooling, public-facing applications without personal data.

Assessment method: Self-assessment or lightweight conformity assessment. Providers document their controls against EUCS Basic criteria and submit declarations.

Key requirements:

What Basic does NOT require:

Basic certification tells you a provider has documented their security posture. It does not tell you the posture has been independently verified or tested.

Level 2: Substantial

Target use cases: Moderate-risk processing, business data with confidentiality requirements, data subject to sector regulations (fintech, HR).

Assessment method: Independent third-party conformity assessment by an accredited Conformity Assessment Body (CAB). Providers cannot self-certify at Substantial.

Key requirements (additions over Basic):

What Substantial does NOT require:

Substantial certification tells you a provider has been audited against serious security criteria. It still does not address jurisdiction — a provider can hold Substantial certification while being fully subject to CLOUD Act orders.

Level 3: High

Target use cases: High-risk data, critical infrastructure operators, public sector, healthcare, financial sector, sensitive public procurement.

Assessment method: Accredited CAB assessment using stricter audit protocols, including technical testing of implemented controls (not just policy review). CABs must themselves be accredited by national accreditation bodies.

Key requirements (additions over Substantial):

What High certification requires that Substantial does not: The jump from Substantial to High is significant. High-level certification is intended for providers handling data where compromise could have severe societal impact. The audit is more invasive and technically rigorous.

The critical gap: Even EUCS High does not currently mandate that cloud providers be EU-incorporated or EU-controlled entities. This was the central controversy.


The Sovereignty Controversy: What Was Almost in EUCS

When ENISA published early EUCS drafts (2020–2022), the High level included sovereignty requirements:

These requirements would have effectively barred AWS, Microsoft Azure, and Google Cloud from EUCS High certification. All three are controlled by US corporations subject to CLOUD Act jurisdiction. Their EU subsidiaries are not independent controlling entities — they are operationally dependent on US parent infrastructure, staffing, and key management systems.

The response from US cloud providers and their government was forceful. The US Trade Representative flagged EUCS sovereignty requirements as discriminatory barriers to trade. US providers argued the requirements would fragment the global cloud market and harm EU companies dependent on hyperscaler services.

The result: By 2024–2025, sovereignty requirements were restructured. The current scheme:

What this means for developers: EUCS High certification is a strong cybersecurity signal. It is not a sovereignty signal. A provider can achieve EUCS High and still be a US corporation subject to CLOUD Act orders for EU data.


EUCS vs. CLOUD Act: The Gap Every Developer Needs to Understand

This is the most important section in this guide.

The CLOUD Act (Clarifying Lawful Overseas Use of Data Act, 2018) allows US law enforcement to compel US-headquartered cloud providers to produce data stored anywhere in the world, including EU data centers, without necessarily notifying the data subject or the EU member state government.

EUCS certification does not address CLOUD Act exposure. Here is why:

What EUCS High CertifiesWhat CLOUD Act Addresses
Security controls (encryption, access, patching)Legal authority to compel disclosure
Physical security of data centersCorporate jurisdiction of provider
Incident detection and responseUS government's authority over US corporations
Key management practicesWhether encryption keys can be compelled
Business continuityWhether provider can legally refuse

A provider can have EUCS High certification — with HSMs, 24/7 SOC, red-team exercises, and full physical security — and still be legally required to hand over your data to the US Department of Justice under a CLOUD Act order.

Why encryption doesn't fully protect you: If a US-parent provider holds your encryption keys (or your data is decrypted for them to read, as in standard cloud storage), a CLOUD Act order can compel them to produce decrypted data. Customer-managed keys (BYOK) with HSMs not accessible to the provider are stronger, but most SaaS workloads don't implement this.

GDPR Art. 48 and the conflict: GDPR Art. 48 prohibits transfers of EU personal data to foreign courts or authorities without proper legal mechanisms (SCCs, adequacy decisions, derogations). CLOUD Act orders conflict with Art. 48. The practical result: a US-parent provider receiving a CLOUD Act order faces a conflict between US federal law and GDPR. US federal law currently wins in US courts.


EUCS, BSI C5, and Gaia-X: How the Frameworks Relate

German developers often encounter BSI C5 (Cloud Computing Compliance Criteria Catalogue) alongside EUCS. Here is how they relate:

FrameworkAuthorSovereignty?CLOUD Act?Scope
EUCS BasicENISANoNoSelf-assessed, broad EU
EUCS SubstantialENISANoNoThird-party audit
EUCS HighENISAOptionalNoAccredited lab
BSI C5 BasicBSI GermanyPartialNoThird-party audit
BSI C5 HighBSI GermanyStrongerNoMore rigorous
SecNumCloudANSSI FranceYes (qualified)PartialFrench public sector
Gaia-X LabelsGaia-X AISBLPortability focusNoSelf-declared + audit

BSI C5 is generally more mature than EUCS and has been required for German federal procurement since 2022. BSI C5 High is roughly equivalent to EUCS Substantial in rigor. BSI C5 does not explicitly address CLOUD Act jurisdiction but has stronger operational security requirements than EUCS Basic.

SecNumCloud (ANSSI, France) is the most sovereignty-aware of these frameworks. Qualified providers must be EU-controlled entities with no foreign-parent access to operations. SecNumCloud qualification is why OVHcloud and Scaleway can credibly claim legal data sovereignty for French public sector workloads. SecNumCloud is a model for what EUCS High's sovereignty tier could have been.

Gaia-X focuses on interoperability, portability, and transparency rather than cybersecurity depth. A Gaia-X label means a provider participates in the federation and declares their data policies, but it is not a security audit framework.


CLOUD Act Risk Matrix: Major Cloud Providers

ProviderLegal EntityUS ParentEUCS Status (2026)CLOUD Act Exposure
AWS (Amazon)Amazon.com Inc (Washington)YesWorking toward Substantial25/25 — High
Microsoft AzureMicrosoft Corp (Washington)YesWorking toward Substantial25/25 — High
Google CloudAlphabet Inc (Delaware)YesWorking toward Substantial25/25 — High
OVHcloudOVH SAS (France)NoWorking toward High3/25 — Low
ScalewayScaleway SAS (France)NoWorking toward Substantial3/25 — Low
HetznerHetzner Online GmbH (Germany)NoNot yet initiated2/25 — Very Low
IONOSIONOS SE (Germany)NoWorking toward Substantial2/25 — Very Low
Clever CloudClever Cloud SAS (France)NoNot yet initiated3/25 — Low
sota.io (on Hetzner)Hetzner GmbH infraNo US parentHetzner infrastructure1/25 — Very Low

Scoring note: 25/25 = maximum CLOUD Act exposure (US-incorporated, US-controlled, all data accessible to parent). 1/25 = minimal exposure (EU-incorporated, EU-controlled, no US operations).


What EUCS Means for GDPR Compliance

EUCS certification is not a GDPR compliance certificate. They address different things:

GDPR Art. 28 (Data Processing Agreements) requires that processors implement appropriate technical and organizational measures. EUCS certification provides evidence of TOMs but does not replace a DPA.

GDPR Art. 46 (Transfers to Third Countries) requires appropriate safeguards for data transferred outside the EEA. EUCS certification does not constitute a safeguard for international transfers — it applies to processing within the EEA.

GDPR Art. 32 (Security of Processing) requires appropriate security measures. EUCS certification is strong evidence of Art. 32 compliance, particularly at Substantial and High levels.

Practical implication: A controller relying on a US-parent provider with EUCS High certification still needs SCCs for any transfer risk, still faces Art. 48 conflict with CLOUD Act, and still risks supervisory authority action if a CLOUD Act order results in data leaving the EEA without proper mechanism.


Practical Checklist: Evaluating Cloud Providers Against EUCS + Sovereignty

Use this checklist when selecting or reviewing a cloud provider:

Tier 1 — EUCS Certification

Tier 2 — Legal Entity and Jurisdiction

Tier 3 — Operational Sovereignty

Tier 4 — GDPR Specifics


What EU-Native PaaS Looks Like in Practice

For developers deploying applications rather than managing raw infrastructure, the relevant question is: does your Platform-as-a-Service provider inherit the sovereignty posture of their infrastructure, or does the platform layer introduce new exposure?

A managed PaaS built on Hetzner (EU-incorporated, Germany-based, no US parent) and operated by an EU entity inherits Hetzner's low CLOUD Act exposure. The deploy platform, the control plane, the build pipelines, the secrets management — all outside US jurisdiction.

Contrast this with a US-originated PaaS (Railway, Render, Fly.io) that runs workloads on AWS or GCP US regions. Even if data is processed in Europe, the control plane, billing system, and customer data often flow through US-incorporated entities.

sota.io runs on Hetzner Germany. Control plane, builds, secrets storage, and data residency are EU-only. There is no US parent company with access to your deployments. CLOUD Act orders cannot reach the operating entity.

EUCS certification is a checklist item. Jurisdiction is the underlying reality. For most EU developers and organizations that care about data sovereignty, the latter matters more.


Timeline: When EUCS Certification Will Matter for Procurement

DateEvent
2024EUCS scheme published, first CABs accredited
2025NIS2-compliant organizations begin requesting EUCS certificates from suppliers
2026EU public procurement increasingly requires EUCS Substantial or High for cloud services
2027Expected: EUCS High required for critical infrastructure operators under CRA and NIS2
2028+EUCS High with sovereignty tier potentially required for classified/sensitive public sector

If you manage infrastructure for a regulated EU organization, your cloud provider needs to be on a path to EUCS certification now. EUCS Basic will not satisfy regulators for sensitive workloads beyond 2026.


Key Takeaways

  1. EUCS has three levels — Basic (self-assessed), Substantial (third-party audited), High (accredited lab, stricter controls). Each addresses cybersecurity posture, not legal jurisdiction.

  2. The sovereignty controversy matters — Original EUCS High would have required EU-controlled providers. The requirement was weakened under US industry pressure. This is a policy gap developers should understand.

  3. EUCS High ≠ CLOUD Act immunity — A US-parent cloud can achieve EUCS High certification and still be subject to CLOUD Act orders. EUCS certifies security controls, not legal sovereignty.

  4. BSI C5 (Germany) and SecNumCloud (France) are complementary — They predate EUCS and are more mature. SecNumCloud is the strongest sovereignty signal in the EU today.

  5. True sovereignty requires both — Technical security (EUCS certification) AND legal protection (EU-incorporated, EU-controlled provider without US-parent jurisdiction). Demand both.

  6. Procurement timelines are moving — EUCS Substantial will be required for regulated workloads in EU procurement by 2026–2027. Providers without a certification roadmap are a risk.


Resources

EU-Native Hosting

Ready to move to EU-sovereign infrastructure?

sota.io is a German-hosted PaaS — no CLOUD Act exposure, no US jurisdiction, full GDPR compliance by design. Deploy your first app in minutes.