Home  ›  Dependency Analysis
Strategic Resilience Analysis

Declarations Are Easy.

True Ownership Requires a Plan.

Nations pass laws, build data centres, and declare sovereignty — while running critical operations on infrastructure they do not own, cannot audit, and cannot easily replace. The question Citadel asks: if your primary supplier were unavailable tomorrow — for any reason — what breaks, and how fast?

⚖️ The Citadel Principle — Sovereignty Is Pro-Resilience, Not Anti-Anyone

The goal is not to remove any vendor from your stack. Good technology is good technology. The goal is to never be fully dependent on any single supplier, jurisdiction, or platform for a function critical to national continuity. The standard is not isolation. The standard is optionality.

“No country — including the United States itself — is completely digitally sovereign. The goal is not a 100% domestic stack. It is diversified exposure, so no single supplier’s outage or policy change can halt your operations.”

— Thierry Carrez, General Manager, OpenInfra Foundation · KubeCon 2026

01 · Legal The Legal Architecture
6 jurisdictions · jurisdiction follows the company, not the data

Every major technology-producing nation has passed laws asserting its right to access data held by its companies — wherever in the world that data physically sits. When you choose a vendor, you accept their home jurisdiction’s legal access framework.

🇺🇸 United States — CLOUD Act
2018 · Active

Compels any US-incorporated company — AWS, Microsoft, Google — to produce data stored anywhere on earth. Jurisdiction follows corporate control, not data location. A server in Riyadh running on AWS is reachable.  Extraterritorial reach

🇨🇳 China — National Intelligence Law
2017 · Active

Article 7 requires all organisations to “support, assist, and cooperate with national intelligence efforts.” Applies extraterritorially to Chinese entities abroad. Any technology of Chinese origin may be subject to state access without disclosure to the user.  Extraterritorial reach

🇪🇺 EU — GDPR · Data Act · AI Act
2018–2026
Restricts data leaving EU jurisdiction. Fines: €20M or 4% of global turnover. The “Brussels Effect” makes EU rules de facto global standards. 2025: €2.3 billion in GDPR fines — 38% year-on-year increase.  Inbound & outbound controls
🇬🇧 UK — Investigatory Powers Act
2016 · Amended 2024

In 2024, the UK secretly ordered Apple to build a global backdoor into iCloud — including non-UK users’ data. UK–US CLOUD Act agreement (2022) creates fast-track mutual data access across Five Eyes.  Extraterritorial reach

🇮🇳 India — DPDP Act + Sectoral Rules
2023 · Enforcement 2025
Applies to any entity processing Indian residents’ data. Sectoral regulators (RBI, IRDAI, SEBI, TRAI) impose additional localization mandates. India’s Stack model — government-built open APIs — is the most applicable model for Saudi Arabia’s digital public infrastructure ambitions.  Localization + extraterritorial scope
🇸🇦 Saudi Arabia — PDPL · NCA CCC-2 · SAMA
Full enforcement Sept 2024

PDPL: prior approval for cross-border transfers, fines up to SAR 3M. NCA CCC-2 mandates sensitive workloads on Saudi territory. SAMA imposes independent financial data residency rules. The legal foundation exists — operationalising it is the work.  Localization + extraterritorial scope

Cloud & Compute

Three hyperscalers hold most enterprise compute

AWS, Azure, and Google Cloud serve most global enterprise workloads. When AWS had an outage (Oct 2025), banking and government portals across multiple continents failed simultaneously. Saudi Hexagon DC (480MW, Jan 2026) is the infrastructure answer. Activating it is the governance work.

AWS

Azure

Google Cloud

Alibaba Cloud

OVHcloud

Hexagon DC (KSA)

Email & Collaboration

Every ministry runs on two US productivity suites

Microsoft 365 and Google Workspace are single points of failure under the CLOUD Act. The ICC precedent (Feb 2025): the kill switch was pulled in hours. Open-source alternatives — Nextcloud, OpenDesk, Proton — are production-ready at government scale.

M365
Google Workspace

Nextcloud

OpenDesk

AI & LLMs

National AI strategy runs on models governed elsewhere

HUMAIN OS (PIF/Aramco, Feb 2026) is Saudi Arabia’s sovereign answer. Until HUMAIN is at scale, every Arabic-language AI workload runs on foreign models subject to vendor training policies, safety guardrails, and deprecation decisions — outside Saudi control.

OpenAI
Google
Anthropic
Qwen
Mistral
HUMAIN (emerging)

Semiconductors

Every AI chip requires a US export licence

Advanced AI compute depends on NVIDIA GPUs — designed in California, manufactured in Taiwan — all subject to US export controls. Every AI data centre built today is contingent on continued US export licence approval. RISC-V offers a long-term design sovereignty path.

NVIDIA
Intel
TSMC (Taiwan)
HiSilicon
RISC-V

Payment Infrastructure

GCC commerce runs on pre-sovereignty payment rails

SWIFT, Visa, and Mastercard underpin all cross-border GCC commerce. Payment infrastructure can be used as a policy instrument — Russia’s SWIFT disconnection proved it. India’s UPI and Brazil’s Pix prove a domestic rail is achievable. The Arab world has no equivalent at scale.

SWIFT
Visa / Mastercard
mBridge (GCC pilot)
UnionPay

Public Communications

Crisis comms run on foreign-governed platforms

Government crisis broadcasts flow through X, Meta, YouTube, and TikTok — platforms whose availability is controlled by private corporations in foreign jurisdictions. A platform suspension can disrupt a government’s ability to reach its citizens without any political act of any adversary.

X / Meta / YouTube
TikTok / WeChat
No regional alt. at scale
Layer Current State & Alternatives Vendor Origin Optionality
AI / LLM Highly concentrated. HUMAIN OS emerging. Open-source (Llama, Mistral, Qwen) provide partial alternatives. US-dominant Concentrated
Cloud compute Three-vendor concentration. Hexagon DC and STC Cloud provide local alternatives. Hybrid architecture is the sovereign path. US-dominant Concentrated
Email & collab Alternatives are production-ready. Schleswig-Holstein: 40,000+ mailboxes migrated, €15M/year saved. Barrier is organisational, not technical. US-dominant Alternatives exist
Semiconductors Most geographically concentrated. Advanced fab only in Taiwan and South Korea. RISC-V enables long-term design sovereignty. Global chain Concentrated
Payment rails Domestic rail viable and proven. mBridge multi-CBDC GCC pilot underway. Does not require displacing SWIFT for international trade. Mixed Alternatives exist
Operating systems Linux is mature for servers and desktops. Government-scale OS migration proven by Schleswig-Holstein. Mobile OS sovereignty remains the hardest unsolved problem globally. US-dominant Partial (servers)
Public comms No regional alternative at scale. Government broadcast channels and Matrix/Signal provide partial independence. US / CN split Concentrated
Subsea cables Multi-stakeholder ownership increasing. Gulf states co-investing in new routes. Redundant landing stations reduce single-route failure risk. Mixed Diversifying

01

Mission Critical Telecommunications sovereign architecture

Identify the 20% of your stack whose failure halts 80% of operations. Build owned, auditable alternatives for those layers first. Everything else can stay with best-in-class providers on commercial terms.

02

Diversify, Don't Isolate

Estonia runs X-Road alongside AWS. India built UPI and still uses global cloud. The goal is never single-vendor dependency — not zero foreign engagement.

03

Audit What You Actually Own

Most organisations cannot answer: what data do we hold, where does it live, who has contractual access? Sovereignty begins with an honest inventory — not a policy declaration.

04

Build to Switch

Vendor lock-in is the enemy of optionality. Open standards and interoperable APIs keep switching costs low and negotiating leverage high — with any vendor, anywhere.

05

Test Continuity, Not Just Plans

Helsingborg (Sweden) ran a full one-year live simulation — would elderly residents receive prescriptions during a complete digital blackout? A plan on paper is not a capability. Resilience is proven through operational exercises.

06

Build the Talent to Maintain It

Schleswig-Holstein migrated 40,000+ mailboxes and 30,000 workstations — saving €15M annually. The barrier was organisational training and political will, not technology. Sovereign infrastructure requires sovereign engineers.

The Legal Architecture

Every Major Jurisdiction Has Done This

The principle that jurisdiction follows the company, not the data is not unique to any one country. Every major technology-producing nation has passed laws asserting its right to access data held by its companies — wherever in the world that data physically sits. When you choose a vendor, you accept their home jurisdiction’s legal access framework.

🇺🇸
United States

CLOUD Act — Clarifying Lawful Overseas Use of Data

Enacted 2018 · Active · Executive agreements: UK (2022), Australia (2024)

Compels any US-incorporated company — AWS, Microsoft, Google, Apple, Meta — to produce data stored anywhere on earth, bypassing diplomatic channels. Jurisdiction follows corporate control, not data location. A server in Riyadh running on AWS is reachable. In 2025, Microsoft admitted it cannot guarantee data sovereignty for EU customers.

“The CLOUD Act shifts jurisdiction from where the data sits to who controls it.” — Exoscale Legal Analysis, 2025

Extraterritorial reach

🇨🇳
China

National Intelligence Law · Cybersecurity Law · Data Security Law

Intelligence Law 2017 · CSL 2017 · DSL 2021 · Active

Article 7 requires all organisations and citizens to “support, assist, and cooperate with national intelligence efforts.” Applies extraterritorially to Chinese entities abroad. Combined with CSL and DSL, any technology of Chinese origin may be subject to state access requirements without disclosure to the user.

“The law applies extraterritorially to Chinese entities abroad. It is a key factor when evaluating Chinese-origin technology.” — SovereignSky, 2026

Extraterritorial reach

🇪🇺
European Union

GDPR · Data Governance Act · Data Act · AI Act

GDPR 2018 · DGA 2023 · Data Act 2025 · AI Act 2026

The EU restricts data leaving EU jurisdiction. Any organisation processing EU residents’ data must comply with GDPR — regardless of incorporation location. Fines: €20M or 4% of global turnover. The “Brussels Effect” makes EU rules de facto global standards. The Data Act further restricts transfers to non-EU authorities.

GDPR: 2,245 fines, €5.65 billion total since 2018. 2025 alone: €2.3 billion — 38% year-on-year increase. — SecurePrivacy, 2026
Inbound & outbound controls
🇷🇺
Russia

Federal Law 242-FZ · SORM · Sovereign Internet Law

242-FZ 2015 · SORM active · RuNet Law 2019

242-FZ mandates Russian citizens’ data be stored exclusively on Russian servers. SORM requires FSB-controlled interception equipment at all providers. The RuNet Law enables technical disconnection from the global internet — tested operationally in 2021. Ukraine reversed its localization rules in 2022 to migrate data to foreign cloud during conflict.

Ukraine’s 2022 reversal of data localization rules demonstrated that rigid localization can be a strategic liability during a crisis — the opposite of resilience.

Extraterritorial reach

🇬🇧
United Kingdom

Investigatory Powers Act ("Snoopers' Charter")

Enacted 2016 · Amended 2024 · CLOUD Act partner since Oct 2022

The IPA compels access to encrypted communications and mandates pre-notification before releasing security updates affecting surveillance. In 2024, the UK secretly ordered Apple to build a global backdoor into iCloud — including non-UK users’ data. The UK–US CLOUD Act executive agreement (2022) creates fast-track mutual data access.
The UK’s 2024 Apple backdoor order demonstrated Five Eyes CLOUD Act partners can use bilateral agreements to reach data well beyond their own citizenry.

Extraterritorial reach

🇦🇺
Australia

Assistance and Access Act (TOLA) · CLOUD Act Agreement

TOLA 2018 · US–Australia CLOUD Act Agreement Jan 2024

TOLA compels companies serving Australians — not just those headquartered in Australia — to provide interception capabilities. The OVHcloud Canada case (Sept 2025): an Ontario court ordered a French company’s Canadian subsidiary to produce data stored in France — with no MLAT required. Geography is not protection.
OVHcloud case (Sept 2025): data stored in France, UK, and Australia ordered produced via a Canadian subsidiary — demonstrating that European-origin data has no geographic protection. — CMS Law, Feb 2026
Extraterritorial reach
🇮🇳
India

Digital Personal Data Protection Act · Sectoral Regulations

DPDP Act 2023 · Enforcement from 2025 · Active

The DPDP Act applies to any entity processing Indian residents’ data — regardless of incorporation. Sectoral regulators (RBI, IRDAI, SEBI, TRAI) impose additional localization mandates. A multinational in Indian banking, insurance, and telecom must comply with three separate data residency frameworks simultaneously. India’s India Stack model reduces private foreign vendor dependency without requiring exclusion.

India’s India Stack — government-built open-API infrastructure — is the most applicable model for Saudi Arabia’s digital public infrastructure ambitions.
Localization + extraterritorial scope
🇸🇦
Saudi Arabia

PDPL · NCA Cloud Controls (CCC-2) · SAMA Regulations

PDPL full enforcement Sept 2024 · NCA CCC-2 active · SAMA active

PDPL requires prior approval for cross-border transfers; fines up to SAR 3M plus imprisonment. NCA CCC-2 mandates sensitive and critical government workloads on Saudi territory. SAMA imposes independent financial data residency rules. The legal foundation for sovereignty exists — operationalising it is the work.

Citadel’s work begins where the law ends: translating PDPL, CCC-2, and SAMA into operational architecture, vendor governance, and measurable maturity levels.
Localization + transfer controls
The Legal Architecture

Where the Stack Is Concentrated Today

Every layer of the digital stack has dominant vendors. The resilience question is not quality — it is concentration. Understanding where single points of failure exist is the beginning of a sovereignty plan.

National Intelligence Law · Cybersecurity Law · Data Security Law

AWS, Azure, and Google Cloud serve the majority of global enterprise workloads — including Saudi government ministries. When AWS had an outage (Oct 2025), it disrupted banking and government portals across multiple continents simultaneously. Owning your compute for critical workloads changes the risk profile. Saudi Arabia's Hexagon DC (480MW, groundbreaking Jan 2026) is the infrastructure answer. Activating it is the governance work.

AWS

Azure

Google Cloud

Alibaba Cloud

OVHcloud

Hexagon DC (KSA)

Every Saudi ministry runs on two US productivity suites

Microsoft 365 and Google Workspace are single points of failure under the CLOUD Act: a US government instruction can halt operations without notice. The ICC precedent (Feb 2025) is the proof point — the kill switch was pulled in hours. Open-source alternatives — Nextcloud, OpenDesk, Proton — are production-ready, deployed at government scale in Germany and France.

Microsoft 365

Google Workspace

Nextcloud

OpenDesk
Proton

National AI strategy runs on models trained and governed elsewhere

Every government deploying AI for public services is doing so on models built outside its borders. HUMAIN OS (PIF/Aramco, Feb 2026) is Saudi Arabia's sovereign answer. Until HUMAIN is at scale, every Arabic-language AI workload running on foreign LLMs is subject to the vendor's training policies, safety guardrails, and deprecation decisions — outside Saudi control.

OpenAI

Google DeepMind

Anthropic

Alibaba Qwen
Mistral
HUMAIN OS (emerging)

Every AI chip in Saudi Arabia requires a US export licence

Advanced AI compute depends on NVIDIA GPUs — designed in California, primarily manufactured in Taiwan — all subject to US export controls. The US has restricted Gulf GPU exports without warning. Every AI data centre built today is contingent on continued US export licence approval. A multi-source supply chain and strategic stockpiling reduce this risk; eliminating it requires domestic chip production.

NVIDIA
Intel
Qualcomm
TSMC (Taiwan)
Huawei HiSilicon
RISC-V (emerging)

GCC commerce runs on pre-sovereignty payment rails

SWIFT, Visa, and Mastercard underpin all cross-border GCC commerce — built as global utilities before sovereignty was a policy consideration. The lesson of Russia's SWIFT disconnection: payment infrastructure can be used as a policy instrument by any coalition of nations. India's UPI and Brazil's Pix prove a domestic rail is achievable. The Arab world has no equivalent at scale yet.

SWIFT

Visa / Mastercard
UPI (India model)

UnionPay

mBridge (GCC pilot)

Crisis communications run on foreign-governed platforms

Government crisis broadcasts, emergency alerts, and national discourse flow through X, Meta, YouTube, and TikTok — platforms whose policies and availability are controlled by private corporations in foreign jurisdictions. A platform outage or account suspension can disrupt a government's ability to reach its citizens through no political act of any adversary. No GCC-region alternative exists at scale.

X / Meta / YouTube
TikTok / WeChat
No regional alt. at scale
Concentration Assessment

Full Stack Optionality Assessment

Every layer mapped against current concentration and the availability of viable, production-ready alternatives.
Layer Current State & Alternatives Vendor Origin Optionality
AI / LLM Highly concentrated. HUMAIN OS emerging. Open-source (Llama, Mistral, Qwen) provide partial alternatives. Fine-tuning on sovereign infrastructure is achievable today. US-dominant Concentrated
Cloud compute Three-vendor concentration. Hexagon DC (KSA) and STC Cloud provide local alternatives. Hybrid architecture is the sovereign path. US-dominant Concentrated
Email & collab Alternatives are production-ready. Schleswig-Holstein: 40,000+ mailboxes migrated, €15M/year saved. Barrier is organisational, not technical. US-dominant Alternatives exist
Semiconductors Most geographically concentrated. Advanced fab only in Taiwan and South Korea. RISC-V enables long-term design sovereignty. Near-term: multi-vendor qualification. Global chain Concentrated
Payment rails Domestic rail viable and proven. mBridge multi-CBDC GCC pilot underway. Does not require displacing SWIFT for international trade. Mixed Alternatives exist
Operating systems Linux is mature for servers and desktops. Government-scale OS migration proven by Schleswig-Holstein. Mobile OS sovereignty remains the hardest unsolved problem globally. US-dominant Partial (servers)
Public comms No regional alternative at scale. Government broadcast channels and Matrix/Signal provide partial independence. Full platform sovereignty remains an open global challenge. US / CN split Concentrated
Subsea cables Multi-stakeholder ownership increasing. Gulf states co-investing in new routes. Redundant landing stations reduce single-route failure risk. Mixed Diversifying
What Good Looks Like

Six Principles of Genuine Resilience

Sovereignty is not a binary state. It is a portfolio of capabilities built layer by layer, giving an organisation the ability to operate on its own terms.

01

Own the Critical Path

Identify the 20% of your stack whose failure halts 80% of operations. Build owned, auditable alternatives for those layers first. Everything else can stay with best-in-class providers on commercial terms.

02

Diversify, Don't Isolate

Estonia runs X-Road alongside AWS. India built UPI and still uses global cloud. The goal is never single-vendor dependency — not zero foreign engagement.

03

Audit What You Actually Own

Most organisations cannot answer: what data do we hold, where does it live, who has contractual access? Sovereignty begins with an honest inventory — not a policy declaration.

04

Build to Switch

Vendor lock-in is the enemy of optionality. Open standards and interoperable APIs keep switching costs low and negotiating leverage high — with any vendor, anywhere.

05

Test Continuity, Not Just Plans

Helsingborg (Sweden) ran a full one-year live simulation: would elderly residents receive prescriptions during a complete digital blackout? A plan on paper is not a capability. Resilience is proven through operational exercises.

01

Build the Talent to Maintain It

Sovereign infrastructure requires sovereign engineers. Schleswig-Holstein migrated 40,000+ mailboxes and 30,000 workstations — saving €15M annually. The barrier was organisational training and political will, not technology.

Commission an assessment
"The question is never which vendors to exclude. The question is: what is the minimum we must own to remain operational on our own terms?"
Citadel Sovereign Advisory delivers a four-phase journey — Design, Demonstrate, Stress Test, and Train — that ends with your people owning a certified sovereign stack, independently. We drive ourselves out of your business, deliberately.

Citadel Sovereign Advisory

Your hardware, your software, your sovereignty?