{"id":24,"date":"2026-04-11T17:01:29","date_gmt":"2026-04-11T16:01:29","guid":{"rendered":"https:\/\/michiel.vanotegem.nl\/?p=24"},"modified":"2026-04-11T17:02:47","modified_gmt":"2026-04-11T16:02:47","slug":"data-residency-is-dumb-for-most-data","status":"publish","type":"post","link":"https:\/\/michiel.vanotegem.nl\/index.php\/2026\/04\/11\/data-residency-is-dumb-for-most-data\/","title":{"rendered":"Data Residency is Dumb (for most data)"},"content":{"rendered":"\n<p id=\"ember834\">Data residency is the idea that data should be stored within a country, and only within that country. The idea behind data residency is that only a country\u2019s jurisdiction applies and that therefore no other country can <em>legally<\/em> access that data. The reality is that legal access risks tell a different story.<\/p>\n\n\n\n<p><em>Note: this post has been updated several times to include latest events, but has not been updated to reflect risks associated with sanctions by a government. If I post an article on that, I will link to it here.<\/em><\/p>\n\n\n\n<p id=\"ember835\">First, legal access doesn&#8217;t necessarily stop at the border. Under certain conditions, requesting data that is stored in another country is possible. The United Stated CLOUD Act is referenced most in this context, but considering most laws in many countries predate the global digitization, it is safe to assume there are countries with laws that can be interpreted to giving government the authority to gain legal access to data outside the country. Even in my own country this <a href=\"https:\/\/www.bijzonderstrafrecht.nl\/home\/column-kan-het-openbaar-ministerie-digitale-gegevens-vorderen-die-zich-in-het-buitenland-bevinden\">doesn&#8217;t seem to be clear cut<\/a>.<\/p>\n\n\n\n<p id=\"ember836\">Second, the risk of legal access by a foreign jurisdiction is extremely small, regardless of where data is stored. To get an idea of the risk, you can look at the <a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/reports\/government-requests\/customer-data\">Government Requests for Customer Data Report<\/a> that Microsoft publishes. It provides the numbers around government access, grouped by country. While the by country numbers say nothing about whether it was a cross-border request, it is striking that absolute number of requests done by countries in Europe is far higher than the United States. I have no idea why that is, but I hope it is because European law enforcement is better at its job. The cross-border requests by the United States are called out specifically in the report and for as far as these reports go back (which is almost a decade now), the number of cross-border requests is pretty low (around 50 per 6 months) and about 10% lead to disclosure of data (which means 90% are successfully redirected or fought in a court of law). In the grand scheme of things, these are very low numbers and you can bet these have to do with international terrorism, drug trafficking, child pornography or other heavy crimes.<\/p>\n\n\n\n<p>Another risk commonly cited is data access requests from intelligence agencies and these are a bit murkier. Microsoft also <a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/reports\/government-requests\/customer-data#tab-national-security-orders-report\">reports<\/a> on this kind of access, specifically for the US Foreign Intelligence Surveillance Act (FISA) and National Security Letters, and these numbers are given in ranges, which is already quite something considering this is considered sensitive information.<\/p>\n\n\n\n<p id=\"ember837\">However, even if you include access for intelligence purposes, there are several areas that pose significantly higher risk than the jurisdictional risk of data not being resident:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cyber-attacks from hackers or nation states trying to access your data or make your data unavailable through <a href=\"https:\/\/www.cpomagazine.com\/cyber-security\/nation-state-ddos-attacks-may-be-the-new-normal-leaked-documents-reveal-russias-fsb-is-seeking-to-build-a-massive-iot-botnet\/\">DDoS attacks<\/a>, by <a href=\"https:\/\/www.welivesecurity.com\/2022\/02\/24\/hermeticwiper-new-data-wiping-malware-hits-ukraine\/\">wiping your data<\/a>, or by <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ransomware-attack-hits-italys-lazio-region-affects-covid-19-site\/\">keeping it ransom<\/a>. Country borders don\u2019t stop these cyber-attacks.<\/li>\n\n\n\n<li>Major natural disasters such as an earthquake or flood are a risk in many countries and are much less predictable than jurisdictional risk.<\/li>\n\n\n\n<li>Some countries are at risk from invasion, in which case data residency becomes a strategic risk in case the invasion force gains control over the infrastructure, which is a risk <a href=\"https:\/\/www.politico.com\/news\/2022\/02\/22\/ukraine-centralized-its-data-after-the-last-russian-invasion-now-it-may-need-to-evacuate-it-00010777\">Ukraine<\/a> is familiar with.<\/li>\n\n\n\n<li>Datacenters can be a target in war, as recently shown in the <a href=\"https:\/\/www.theguardian.com\/technology\/2026\/mar\/10\/datacenters-target-warfare-iran\">Iran war<\/a>.<\/li>\n<\/ul>\n\n\n\n<p id=\"ember839\">With networking becoming more available in even the remotest places and satellite networking that is even available if <a href=\"https:\/\/edition.cnn.com\/2022\/02\/27\/business\/starlink-activated-ukraine\/index.html\">hard links are cut<\/a>, the location of most data and applications doesn\u2019t really matter. Exceptions to this are applications that require (ultra) low latency or potentially highly sensitive data you don\u2019t want to run connected to a public network (e.g. data on spies and missiles).<\/p>\n\n\n\n<p id=\"ember840\">The truth is that while there is a lot of data out there that probably shouldn\u2019t be public, most of that data is of little interest to foreign jurisdictions or intelligence. The ERP system of your local municipality, the systems of the water management department, or even most healthcare data is not that interesting for legal procedures. Criminals would however love to get their hands on that data or disrupt these systems. And because these systems are usually connected to the internet in some way to provide services to citizens, these systems carry significant cyber security risk. That obviously doesn&#8217;t mean we should ignore legal access and intelligence gathering risks, but we need to weigh that risk appropriately.<\/p>\n\n\n\n<p id=\"ember841\">What this means is that for many applications the traditional CIA (Confidentiality, Integrity, Availability) attributes turn into two attributes: Security and Availability. And for different scenarios, different solutions will have different advantages and disadvantages. From a disaster perspective, the most available compute and storage infrastructure on the planet is the hyperscale cloud. And from a cybersecurity perspectice, hyperscale cloud providers process <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/\">trillions of security signals<\/a> every day to keep their customers save. But there are other considerations when it comes to availability, for example supply chain issues, boycott scenarios, and more. Weighing these risks and using the right architecture to mitigate these risks is much more important than whether data is located inside the country or not.<\/p>\n\n\n\n<p id=\"ember842\">As a citizen, it is my hope that my country\u2019s government organizations will look at their applications and classify them in a rational manner to properly assess and weigh the risk to data, and to not just look at jurisdictional risks. Unfortunately, the current sentiment driven by geopolitical unrest is one that focuses on building government controlled infrastructure. This in itself is not a bad idea, but it should be used as one solution of many, not as THE solution. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data residency is the idea that data should be stored within a country, and only within &hellip; <a title=\"Data Residency is Dumb (for most data)\" class=\"hm-read-more\" href=\"https:\/\/michiel.vanotegem.nl\/index.php\/2026\/04\/11\/data-residency-is-dumb-for-most-data\/\"><span class=\"screen-reader-text\">Data Residency is Dumb (for most data)<\/span>Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":25,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,6,4],"tags":[],"class_list":["post-24","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-resilience","category-security","category-sovereignty"],"_links":{"self":[{"href":"https:\/\/michiel.vanotegem.nl\/index.php\/wp-json\/wp\/v2\/posts\/24","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/michiel.vanotegem.nl\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/michiel.vanotegem.nl\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/michiel.vanotegem.nl\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/michiel.vanotegem.nl\/index.php\/wp-json\/wp\/v2\/comments?post=24"}],"version-history":[{"count":1,"href":"https:\/\/michiel.vanotegem.nl\/index.php\/wp-json\/wp\/v2\/posts\/24\/revisions"}],"predecessor-version":[{"id":26,"href":"https:\/\/michiel.vanotegem.nl\/index.php\/wp-json\/wp\/v2\/posts\/24\/revisions\/26"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/michiel.vanotegem.nl\/index.php\/wp-json\/wp\/v2\/media\/25"}],"wp:attachment":[{"href":"https:\/\/michiel.vanotegem.nl\/index.php\/wp-json\/wp\/v2\/media?parent=24"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/michiel.vanotegem.nl\/index.php\/wp-json\/wp\/v2\/categories?post=24"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/michiel.vanotegem.nl\/index.php\/wp-json\/wp\/v2\/tags?post=24"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}