LogoLogo
Give FeedbackGovStack Home
Development
Development
  • GovStack
  • Contributing
  • Architecture and Nonfunctional Requirements
    • 2 Introduction
    • 3 GovStack Architecture
    • 4 Building Block Design Principles and Considerations
    • 5 Cross-Cutting Requirements
    • 6 Onboarding Products
    • 7 Standards
    • 8 UI Switching and Handover
    • 9 Other Resources
  • Security Requirements
    • 2 Description
    • 3 Terminology
    • 4 Security Management
    • 5 Cross-Cutting Requirements
    • 6 Standards
    • 7 Authorization Services
    • 8 Additional Security Modules
    • 9 Other Resources
  • Digital Sovereignty - Cloud Infrastructure
    • Abstract
    • Digital sovereign cloud technology
    • Digital Sovereignty considerations
    • Architectural graphics
  • GovStack UI/UX Guidelines
    • 1 Version History
    • 2 Description
    • 3 Service design good practice guidelines
      • 3.1 User-centred design
        • 3.1.1.1 Understand needs and requirements
        • 3.1.1.2 Involve others in the design process
        • 3.1.2.1 Test with users
        • 3.1.3.1 Share findings
        • 3.1.3.2 Monitor performance
          • 3.1.3.3 Set up analytics
      • 3.2 Accessibility and inclusion
        • 3.2.1.1 Test for accessibility
        • 3.2.2.1 Involve a diverse user group in the design
        • 3.2.2.2 Support multiple languages
        • 3.2.2.3 Foster a culture of inclusion
      • 3.3 Consistency
        • 3.3.1.1 Use simple language
        • 3.3.2.1 Implement a consistent style guide
        • 3.3.2.2 Use design patterns
        • 3.3.2.3 Use a frontend framework
        • 3.3.3.1 Interoperability
        • 3.3.3.2 Use integrations
        • 3.3.4.1 Work in the open
      • 3.4 Technology choices
        • 3.4.1.1 Choose the right level of security
        • 3.4.1.2 Design for privacy
        • 3.4.2.1 Optimise load times
        • 3.4.2.2 Account for connectivity issues
        • 3.4.3.1 Test across platforms
        • 3.4.3.2 Design cross-channel
    • 4 Design patterns
      • 4.1 Service patterns
      • 4.2 User flows
        • 4.2.1 Register
        • 4.2.2 Authenticate
        • 4.2.3 Asking users for feedback
        • 4.2.4 Find a service
        • 4.2.5 Check a users eligibility
        • 4.2.6 Make an application
      • 4.3 Page templates
        • 4.3.1 Feedback
        • 4.3.2 Perception survey
        • 4.3.3 Satisfaction
        • 4.3.4 Before you start
        • 4.3.5 Service sheet
        • 4.3.6 Asking users for consent
        • 4.3.7 Task list
        • 4.3.8 Asking users for information
        • 4.3.9 Check answers
        • 4.3.10 Outcome
    • 5 Use-case examples
    • 6 References
    • 7 Other Resources
  • Building Blocks
    • About Building Blocks
    • Consent
    • Digital Registries
    • E-Marketplace
    • E-Signature
    • Geographic Information System (GIS)
    • Identity
    • Information Mediation
    • Messaging
    • Payments
    • Registration
    • Scheduler
    • Workflow
  • Cloud Infrastructure
  • Use Cases
    • Reference Use Cases
  • Public Administration Ecosystem Reference Architecture (PAERA)
    • PAERA
  • Tools
    • Sandbox
  • Release Notes
    • 23Q4
Powered by GitBook

Apache-2.0 license

On this page

Was this helpful?

  1. Digital Sovereignty - Cloud Infrastructure

Abstract

Based on digital sovereign cloud technology

States, societies, companies, and individuals have much to gain by leveraging modern digital cloud-based technology. Yet embracing technology without oversight over dependencies can easily result in situations where digital infrastructure is at the mercy of large foreign entities without any substantial possibility to exercise their control over it, without any possibility to reflect your values or to assert your regulation over it. Vendor lock-in is the opposite of digital sovereignty.

This document shows ways how to leverage open technology to gain and retain a high degree of digital sovereignty and thus increase the freedom to make deliberate decisions on using IT technology and data.

Summary

The following dimensions should be considered and implemented by states and administrative units to achieve a high degree of digital sovereignty:

  • Running IT infrastructure on its own hardware or at trusted (national/regional) cloud providers

  • Ensuring the availability of more than one technologically compatible provider

  • Have resilient rule sets for digital processes, security, data protection, ...

  • Using open source software to avoid all kinds of vendor lock-in and dependencies and to foster the ability to control and innovate with secure cloud technology

  • Using mature open-source software for advanced requirements of governments

  • Gaining competence in cloud operations (hardware- and software) and cloud-native development and knowledge to implement and operate cloud technology – open-source projects and communities can compensate for this step and help to build up local competence1. Having the independence in software is a huge step towards digital sovereignty, but having the knowledge and the ability to develop and operate these software stacks increases the independence substantially

PreviousDigital Sovereignty - Cloud InfrastructureNextDigital sovereign cloud technology

Last updated 1 year ago

Was this helpful?