There's an obsession in the Dutch cloud sovereignty debate. That obsession is called 'hyperscaler'. But the biggest sovereignty gap isn't in the cloud. It's in the outsourcing contract that's been sitting in your drawer for ten years.
In every boardroom, at every conference and in every advisory report, the same question surfaces: how do we maintain control over our data and infrastructure when they run on platforms owned by American tech giants?
It's a legitimate question, but it's not the first question you should be asking. Many organisations worrying about sovereignty risks from AWS, Azure or Google Cloud have an equally significant sovereignty problem much closer to home. A problem that's not new, but that no one openly acknowledges: the outsourcing provider.
Our conviction is clear. The biggest sovereignty gap at many Dutch organisations isn't in the cloud. It sits in the relationship with the provider who manages the infrastructure, data, identities and security controls, all locked into contracts that reflect a threat landscape that no longer exists.
Let's be honest about what outsourcing means in practice. Five to ten years ago, a large portion of Dutch business transferred the operation of their local IT environments to specialised providers, often foreign. The business case was clear: focus on your core, leave IT operations to a party that can do it more efficiently. In return, the provider gained far-reaching control over the technical environment.
Now look at what was actually transferred back then:
The test to see if these sovereignty risks apply to your organisation is simple. If you had to switch outsourcing providers tomorrow morning (due to a cyber incident, contractual dispute or strategic pivot), could you? Do you have the technical and operational control to make the transition without months of disruption?
For most organisations, 'no' is the honest answer. At that point, you're no longer talking about outsourcing. You're talking about sovereignty loss.
This situation worsens through a dynamic we rarely acknowledge but that occurs structurally. The characteristics of that dynamic:
We don't see this as market dynamics. We see it as a sovereignty risk in slow motion.
This isn't theory. In 2025, a retail company was hit by a cyber attack with direct consequences for business operations. The response was as remarkable as it was revealing: the company terminated the outsourcing contract with the provider.
The attack exposed what remained invisible during calm times: the dependency on the outsourcing provider was a structural vulnerability that only became visible when it mattered most. When speed of action, operational control and direct access to systems made the difference between limited damage and operational disruption.
The other cyber attack in the same year tells a comparable story. Dependencies in the supply chain, including outsourcing, create vulnerabilities that only manifest when it's too late. The weakest link isn't the technology. The weakest link is the governance model around it.
These examples aren't exceptions. They show what happens when the illusion of control is tested by reality. Dutch organisations are having intensive conversations about digital sovereignty in the cloud context. About data residency, about the Cloud Act, about European alternatives. Those conversations are important and necessary. But these same organisations handed over their local environments to (offshore) outsourcing providers years ago, effectively relinquishing the control they're now trying to protect in the cloud.
The consequence is uncomfortable, but clear. Before you address sovereignty in the cloud, you need to answer several questions honestly.
The way forward isn't to abolish outsourcing. That's neither realistic nor desirable. Outsourcing can deliver value, provided the sovereignty balance is right. The way forward is to view outsourcing relationships through exactly the same sovereignty lens as cloud relationships.
The sovereignty discussion in the Netherlands is currently too narrow. It focuses on the cloud, whilst the dependencies that matter most for many organisations aren't in the cloud at all. They're in outsourcing relationships that have been taken for granted for years.
This is the second part of a blog series on cloud sovereignty. The first part was about 'the collision no one acknowledges': the strategic clash between sovereignty and AI acceleration.