Close Menu
WashingtonExec
    Podcast Episodes
    LinkedIn Facebook X (Twitter) Instagram YouTube
    LinkedIn Facebook X (Twitter) Instagram YouTube
    WashingtonExec
    Subscribe To The Daily
    • News & Headlines
    • Executive Councils
    • Videos
    • Podcast
    • Events
      • 🏆 Chief Officer Awards
      • 🏆 Pinnacle Awards
    • About
    • Contact Us
    LinkedIn YouTube X (Twitter)
    WashingtonExec
    You are at:Home»News»Why Zero Trust is the Missing Link in Global Data Governance
    News

    Why Zero Trust is the Missing Link in Global Data Governance

    By Tina MeadowsMarch 24, 2026
    Share
    LinkedIn Facebook Twitter Email
    Tina Meadows, CGI

    Tina Meadows is a vice president at CGI. 

    As organizations race to modernize in the cloud, a silent conflict is brewing: Who really controls your data? The promise of global connectivity has exposed a fundamental gap between where data lives and who has the legal right to access it.

    Data sovereignty, an aspect of governance and regulatory oversight, attempts to close the gap through legal and regulatory schemes. It essentially means that the jurisdiction where the data originates retains legal control over it.

    For example, data generated in a European Union (EU) country, subject to the EU’s General Data Protection Regulation (GDPR), remains subject to that law even when it resides in a U.S.-based hyperscaler’s cloud environment.

    In 2020, the Court of Justice of the European Union ruled that data could not be exported from the EU or the European Economic Area (EEA) unless the receiving nation’s laws provided equivalent safeguards against unauthorized access, including by that nation’s intelligence agencies. Commonly known as the Schrems II ruling, this laid the groundwork for the establishment of data sovereignty within the EU/EEA.

    The structural gap in traditional cloud security

    For data sovereignty to matter, nations must have the technological means to enforce it. The hyperscalers themselves typically provide strong perimeter controls, data encryption at rest and multiple options for storage locations. However, these measures are managed by the providers and not enforced by jurisdiction.

    The cloud providers rarely enforce persistent, object-level sovereignty controls, geofenced key governance or jurisdiction-aware decryption logic. CGI and XQ have introduced a solution that draws on zero trust principles to provide data owners with the tools they need.

    Maintaining data sovereignty: The role of zero trust

    The technologies needed to enforce data sovereignty can be seen as an extension of familiar zero trust concepts. Foundational capabilities and features of CGI and XQ’s data sovereignty solution include:

    Object-level end-to-end encryption: Each object of data is individually encrypted, rather than a data set as a whole, providing precise, granular control. The data is encrypted in every state: at rest, in use or in transit.

    Localized key management: The prevailing jurisdiction maintains the encryption keys, ensuring enforcement of local laws and policies. Importantly, the hyperscaler does not have any control over the keys, ensuring that the cloud provider cannot decrypt the data in violation of the law.

    Dynamic geofencing: This allows data owners to restrict access to a specified geography, further ensuring that only authorized users within the jurisdiction have access.

    Zero trust architecture: Zero trust access control requires any entity trying to access data—whether human or another system—be authenticated and verified before access is granted. This adds a layer of protection against the insider threat as well as external attempts.

    With enforceable access controls based on identity, location and the jurisdiction’s policy, the solution ensures that no one can reach the data who is not authorized to do so.

    The practical application means that one hyperscaler environment can host data from multiple sources, with each one subject to its own specific controls. An object that originated in France can be decrypted only by an authorized user in France, say, while data object from Germany, housed in the same S3 instance, have their own access rules that the system enforces. Because the cloud provider does not control the keys, it cannot decrypt the data in response to a request from another country.

    Conclusion

    It isn’t enough to rely on data residency to enforce data sovereignty. Data sovereignty requires object level encryption, sovereign key control, jurisdiction-aware decryption logic and persistent zero trust enforcement at the data layer.

    Data sovereignty is a structural shift from perimeter-based trust to sovereign data enforcement. While international agreements, court rulings and diplomacy sort out the specifics among sovereign jurisdictions, implementing the tools needed to enforce those rules is imperative.

    Previous ArticleTonia Patt Puts People at the Center of Two Six’s Mission

    Comments are closed.

    LinkedIn Follow Button
    LinkedIn Logo Follow Us on LinkedIn
    Latest Industry Leaders

    Top Space Execs to Watch in 2026

    Top Cloud Executives to Watch in 2026

    Load More
    Latest Posts

    Why Zero Trust is the Missing Link in Global Data Governance

    March 24, 2026

    Tonia Patt Puts People at the Center of Two Six’s Mission

    March 23, 2026

    DCS Corp. Wins $980M Air Force Automatic Test Systems Contract

    March 23, 2026

    Precise Systems Adds NAVAIR Veteran Summer Raley as VP of BD

    March 23, 2026

    Top Space Execs to Watch in 2026: LeoLabs’ Tony Frazier

    March 23, 2026
    Quick Links
    • Executive Councils & Committees
    • Chief Officer Awards
    • Pinnacle Awards
    • Advertise With Us
    • About WashingtonExec
    • Contact
    Connect
    • LinkedIn
    • YouTube
    • Facebook
    • Twitter

    Subscribe to The Daily

    Connect. Inform. Celebrate.

    Copyright © WashingtonExec, Inc. | All Rights Reserved. Powered by JMG

    Type above and press Enter to search. Press Esc to cancel.