Geopolitical shifts and evolving regulatory frameworks like the EU AI Act, the NIS2 Directive, and the Digital Operational Resilience Act (DORA) continue to redefine the landscape for global enterprises. This has shifted digital sovereignty from an abstract compliance concept to a critical strategic mandate for risk mitigation. 

For organizations in highly regulated industries, achieving true digital autonomy requires more than just localizing physical data centers. It demands developing a strong sovereign support model to help build, deploy and run critical workloads in-jurisdiction. This requires verifiable control over data flows, encryption, software supply chains, and operational transparency. 

To help meet this need, Red Hat already offers Red Hat Sovereign Cloud, an open source foundation and resilient infrastructure platform that hosts critical sovereign workloads. We’re now pleased to announce the general availability of Red Hat Confirmed Sovereign Support, a premium, in-region operational service that helps protect these workloads from violating jurisdictional boundaries. Confirmed Sovereign Support is now available in both the U.S. and European Union (EU), with a planned future rollout in other regions.

This post details the engineering and architectural realities behind Confirmed Sovereign Support, exploring how we maintain support engineering reliability while enforcing data and operational sovereignty.

Digital sovereignty 101: get the basics

The sovereignty challenge

Historically, global enterprise software support has relied on a "follow-the-sun" (FTS) operational model. While efficient for standard needs, the FTS model requires diagnostic data to constantly cross international borders, creating a potential compliance gap under modern regulations.

For sovereign-mandated environments, reliance on centralized control planes and global support chains creates a "hyperscaler trap"—where sensitive diagnostic data and operational metadata are potentially exposed to foreign legal obligations, extraterritorial reach, and unauthorized access. To help achieve true sovereignty, Red Hat has fundamentally re-architected support operations to resolve the friction between global expertise and regional isolation.

Regional isolation for support case management 

A primary architectural challenge for global Software-as-a-Service (SaaS) providers is scaling for sovereign operations when internal case management systems do not run locally. To enforce data residency without disrupting the enterprise support lifecycle, Red Hat has strictly split support data handling in Confirmed Sovereign Support:

  • Isolated diagnostic data: All sensitive customer-uploaded files, such as diagnostic logs, configurations, and sos-reports are routed to and stored within an isolated regional boundary.
  • Metadata protection: Associated case comments and ticketing metadata reside in the US-hosted service cloud. To protect this metadata, we implement rigorous role-based access control (RBAC), restricting visibility to verified in-region support engineers.

To tap into the depth of Red Hat’s global engineering expertise without violating jurisdictional boundaries, Confirmed Sovereign Support employs a "mirror case" workflow. Regional Confirmed Sovereign Support engineers retain ownership of the primary customer relationship and the environment. If a complex issue requires escalation, the Confirmed Sovereign Support engineer creates a secondary, stripped-down mirror case via our isolated regional support infrastructure. This enables global engineers to collaborate on an issue while keeping the original sensitive data locked within the regional boundary.

The SOS Clean AI Project

But a mirror case is also only as protected as the data it contains. Before any diagnostic data snippets are shared with global experts, it must undergo a strict sanitization process. Confirmed Sovereign Support engineers utilize native tools like sos clean to thoroughly obfuscate and scrub confidential data and sensitive environmental configurations from diagnostic files.

To scale this capability and mitigate the risk of human error, Red Hat is pioneering the SOS Clean AI project. We are integrating AI-driven scrubbing into the support workflow to automate the obfuscation of sensitive diagnostic data. To deliver the highest levels of precision, we utilize regionalized AI foundational agents that perform a thorough, multi-pass review of all scrubbed output before it is finalized.

This system is continuously refined through the integration of human-verified log snippets, which serve as a secure training loop to enhance the model's recognition of complex data patterns. By keeping the AI processing entirely within the regional boundary and grounding its learning in expert-validated data, we provide a verifiable, high-integrity barrier against accidental data leakage during global support interactions.

Operational guardrails

Technology and architecture are insufficient without stringent human governance. Confirmed Sovereign Support enforces strict operational guardrails:

  • Verified local talent: Support is delivered exclusively by senior engineers who are legally authorized to work in the EU and physically operating on that soil.
  • Vetted personnel: Engineers undergo rigorous background checks and security training to meet strict jurisdictional standards.
  • Least privilege policy: Direct access to customer infrastructure is prohibited without explicit customer authorization, managed through  auditable identity and access management control planes localized to the region.

By localizing both the engineering talent and administrative access, Red Hat significantly reduces the risk of extra-jurisdictional interference.

Redefining your digital destiny

The implementation of Red Hat Confirmed Sovereign Support demonstrates that digital sovereignty cannot be achieved through superficial compliance check-boxes or geographical data mirroring alone. It requires a fundamental re-engineering of how data, personnel, and access protocols interact.

By combining the transparency of open source with verifiable regional control, Red Hat helps provide true operational autonomy. This empowers organizations to adopt sovereign cloud platforms and advanced AI workloads, knowing that their digital destiny—and the data that fuels it—remains under their own jurisdiction. Your cloud, your rules. 

Enabling sovereign support today is a simple upgrade to your Red Hat Global Support Services, all while retaining like-for-like product entitlement. Meanwhile, learn more about Red Hat Sovereign Cloud and take your first steps in assessing your digital sovereignty readiness

Download the Red Hat Confirmed Sovereign Support datasheet today. 

Ressource

L'entreprise adaptable : quand s'adapter à l'IA signifie s'adapter aux changements

Ce livre numérique de Michael Ferris, directeur de l'exploitation et de la stratégie chez Red Hat, aborde le rythme des changements et des bouleversements technologiques liés à l'IA auxquels sont confrontés les responsables informatiques.

À propos de l'auteur

Jason Willeford is the Global Lead for Secure Global Support (SGS) at Red Hat. A 21-year Red Hat veteran and U.S. Air Force veteran with deep expertise in scaling secure global operations for the world’s most regulated industries, he architected the foundational models for Confirmed Stateside Support (CSS-US) and Confirmed Sovereign Support (CSS-EU). He is dedicated to providing high-integrity support solutions that meet the rigorous security and compliance needs of global governments and the intelligence community.

UI_Icon-Red_Hat-Close-A-Black-RGB

Parcourir par canal

automation icon

Automatisation

Les dernières nouveautés en matière d'automatisation informatique pour les technologies, les équipes et les environnements

AI icon

Intelligence artificielle

Actualité sur les plateformes qui permettent aux clients d'exécuter des charges de travail d'IA sur tout type d'environnement

open hybrid cloud icon

Cloud hybride ouvert

Découvrez comment créer un avenir flexible grâce au cloud hybride

security icon

Sécurité

Les dernières actualités sur la façon dont nous réduisons les risques dans tous les environnements et technologies

edge icon

Edge computing

Actualité sur les plateformes qui simplifient les opérations en périphérie

Infrastructure icon

Infrastructure

Les dernières nouveautés sur la plateforme Linux d'entreprise leader au monde

application development icon

Applications

À l’intérieur de nos solutions aux défis d’application les plus difficiles

Virtualization icon

Virtualisation

L'avenir de la virtualisation d'entreprise pour vos charges de travail sur site ou sur le cloud