Page 61 - Red Hat PR REPORT - AUGUST 2025
P. 61
8/8/25, 10:48 AM Digital Sovereignty Goes Beyond Compliance: Why Autonomy and Resilience Are Now Strategic Imperatives
The Dutch government has formally distinguished these two concepts: a company can be legally sovereign (regulated by national laws) but
lack autonomy if it cannot function independently when service providers pull the plug.
Strategies For True Digital Autonomy
Guijarro outlines a strategic roadmap for achieving digital autonomy:
Diversify Infrastructure: Eliminate single points of failure through multi-cloud and hybrid cloud models, incorporating on-premise
systems to reduce dependency on any one provider.
Embrace Open Source: Technologies like Red Hat OpenShift enable portability across cloud environments and provide the flexibility,
transparency, and privacy required to meet sovereign requirements.
Utilize Confidential Computing: These technologies protect sensitive data even while using third-party cloud services, offering a bridge
between security and efficiency.
Control Your Exit Strategy: Businesses must prepare for the possibility of needing to migrate systems and data if service providers change
their policies or fall under new geopolitical restrictions.
Invest in Community-Driven Resilience: Global cybersecurity infrastructure, such as the CVE database, has shown the importance of
decentralized support systems and the value of international open source collaboration.
The Role Of Open Source In Sovereignty
Open source solutions, according to Guijarro, not only provide a neutral and decentralized approach to technology development but also
empower nations and organizations to build local capabilities and innovation ecosystems. It offers transparency, control, and a
collaborative backbone for future-proofing digital strategies.
"Resilience is not something to be delayed—it is the foundation of a sovereign digital future," says Guijarro. "If we’re only consumers of
technology, we risk stagnation. But by contributing to and investing in open source, we ensure innovation, security, and long-term control."
Conclusion
Digital sovereignty is no longer just a regulatory checkbox—it is a strategic necessity. As the examples of ATB and UniSuper demonstrate,
organizations that rely solely on compliance and third-party infrastructure are vulnerable. The key takeaway: true digital sovereignty
requires proactive investment in resilience, autonomy, and open ecosystems. Businesses must move now to ensure they are prepared
for whatever the geopolitical and technological future may hold.
https://www.dayofdubai.com/news/digital-sovereignty-goes-beyond-compliance-why-autonomy-and-resilience-are-now-strategic-imperatives#google_vi… 2/2

