Home  ›  The Framework

Digital Sovereignty Maturity Model

Five levels. Six dimensions.
Measurable. Actionable.

Adapted from Carnegie Mellon’s CMMI. The model tells you where you are. The four phases are how you move. Phase 3 — the Stress Test — is the gate between L2 and L3 that no one else can certify you through.

01

Design

Exposure map · Kill-switch register · Target architecture across six dimensions

02

Visibility

Build and deploy the sovereign stack — compute, data, identity, AI, comms

03

Stress Test Google-grade

Millions of simulated clients. Fault tolerance. Geo-redundancy. RTO certified. No one else does this.

04

Full sovereign capability

KAUST-certified sovereign engineers. Self-replicating. We drive ourselves out — deliberately.
01 · Levels Digital Sovereignty Maturity Model — L0 to L4
5 levels · CMMI-adapted · Phase 3 is the gate

D1 — 25% weight

Cloud & Compute

Where does your compute live, who owns the data centre, and who controls activation keys for your infrastructure?
L0 All workloads on foreign cloud. No in-country alternative.

L0 Hexagon DC + STC Cloud validated. 99.999% availability certified..

D2 — 20% weight

Data Residency

Where does your national data actually live — and who holds the encryption keys? PDPL compliance is the floor, not the ceiling.

L0 Data location unknown. Exits borders freely. No PDPL compliance.

L0 All sensitive data in-country. SDAIA audit trail complete. CMEK enforced.

D3 — 15% weight

Identity & Access

Who controls authentication for your citizens and officials? A suspended IdP is a suspended government.

L0 Vendor-controlled IdP (Azure AD/Okta). No local audit trail.

L0 Nafath as primary. OpenLDAP/Keycloak fallback. HSM local keys. NCA-certified.

D4 — 15% weight

AI & Analytics

Who trained the models making decisions inside your government? Whose laws govern the inference?

L0 All inference hits foreign endpoints. Model weights not inspectable.

L0 HUMAIN OS + local Arabic LLM. On-prem inference. Foreign AI dependency eliminated.

D5 — 15% weight

Public Safety Comms

P25 / MCPTT emergency networks. Who holds the activation keys for police, fire, and ambulance communications?
L0 Motorola/Harris KKEK held by vendor. Remote deactivation possible.
L0 In-country KMF. KKEK sovereign. 3GPP MCPTT on STC 5G as fallback.

D6 — 10% weight

Legal & Contractual

Do your vendor contracts give you a kill-switch right? Whose jurisdiction applies? Change-of-control clauses in place?
L0 No data residency clauses. No kill-switch rights. No change-of-control protection.
L0 Kill-switch termination rights in all contracts. SLA penalties enforced. SAGIA-compliant.

01

Air-gapped sovereign architecture

Your hardware. Your software. Your data. Your identity. Your uptime. Under your control — permanently.

L2

L3

02

Stress test & prove it

Millions of simulated clients. Fault tolerance certified. Geo-redundancy proven. Declaration is not demonstration.

L2

L3

03

Governance and audit

Independent certification that your sovereign capability is real — not sovereignty-washed.

L1

L2

L3

L4

04

Local and on-premises AI

Inference that never leaves the country. Models you own. Data that never trains someone else’s system.

L2

L3

05

Train the Trainers

We deliberately drive ourselves out of your business. KAUST-certified sovereign engineers who own this without us — forever.

L1

L2

L3

Ready to see where you sit?

Phase 1 — Design — delivers your complete six-dimension DSMM score in 8 weeks.

Citadel Sovereign Advisory

Your hardware, your software, your sovereignty?