Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » Blogs » Privacy & Compliance » Metadata, cloud sovereignty’s weak spot
6 min Privacy & Compliance

Metadata, cloud sovereignty’s weak spot

Erik van KlinkenFebruary 20, 2026 1:24 pmFebruary 20, 2026
Metadata, cloud sovereignty’s weak spot

US authorities could access the metadata of public cloud users, even if they use the sovereign offering of an American hyperscaler. According to a Dutch legal firm, the Americans cannot access customer data on the AWS European Sovereign Cloud, although the same cannot be said about all metadata. At what point does customer data become metadata? And what could one learn about cloud users based on the metadata they leave behind, even if their ‘personal’ data appears to be secure?

Metadata is always difficult to define. In fact, it is effectively infinite, because information about information can occur in any and all forms. It forms the basis for search engines and administrative processes. In addition, it is useful for monitoring IT systems. This is why hyperscalers, whether they are called AWS, Google Cloud, or Microsoft Azure, retain access to certain metadata. Examples of such data includes capacity management, system health, the number of deployments, and fraud detection systems. So-called operational metadata leaves Europe when it comes to AWS in any case, and presumably the same applies to Google and Microsoft. Even Microsoft’s EU Data Boundary does not rule out some metadata reaching America from Europe.

The hyperscalers all make slightly different distinctions between types of metadata. For example, Microsoft uses diagnostic data for when administrators or users work with a service, including IP addresses, client locations, and routing information. Service-generated data concerns traffic patterns and logs about usage for health monitoring. Google Cloud does roughly the same thing with Admin Activity and Data Access audit logs. At AWS, telemetry is discussed in the same way that the other two cloud giants talk about metadata. The company collects this data to “understand how features are used and to improve our services.” There are opt-outs for AI training and user behavior, but not for telemetry for packet routing and billing.

Valuable information

In the context of the public cloud, metadata is far from monolithic. The exact classification of purchased resources, roles, permissions, resource labels, and configurations belong to the customer data. AWS cannot access this, according to an analysis by law firm Greenberg Traurig on the Dutch applicability of AWS’ sovereign offering. Below is the report’s overview of the split metadata (we would link to it, were it not for the fact it was taken offline for some reason):

Tabel waarin de opslaglocatie en overdrachtsregels voor klantgegevens en metadata in AWS worden vergeleken, met de verschillen tussen opslag en overdracht binnen en buiten de EU, met en zonder toestemming van de klant.

The division of metadata is understandable, but it does rely on the hyperscaler’s good behavior. The data that AWS has available from a foreign government agency that uses the European Sovereign Cloud is still considerable. At the very least, the metadata shows what an AWS customer consumes in terms of cloud resources and what they pay for them. Since the exact information is not shared by the hyperscalers, it is unknown whether that consumption can also be localized. The AWS European Sovereign Cloud is managed as a separate entity outside the regular AWS, so because of that separation, even anonymized data is less anonymous than you might think. There may be relatively few sovereign customers, and if AWS can determine which data center is being used and how many resources are being used, it may be easy to identify which customer is involved.

The problem with that conclusion is that we cannot know for sure. It is precisely this lack of clarity that makes metadata a ‘black box’ for sovereignty. It is also important for ordinary customers to pay attention to metadata. Since cloud players never reveal their architecture in detail, it remains a matter of guesswork. Hence the emphasis on who can view the metadata, beyond what that metadata actually is.

Who versus what

The implication behind splitting up metadata is that not all of this information is equally important to keep private. According to the hyperscalers, customer data ‘itself’, i.e. the actual files, applications, and identities of a cloud environment, remains within the European Union for sovereign customers. The metadata generated directly by the configuration of the customer’s own environment also remains within the EU.

The recent report by Greenberg Traurig points out that AWS Sovereign Cloud metadata is subject to an additional ‘layer of protection’: European employees. Eventually, it must be fully staffed by European citizens who also reside within the EU. This shows that the company is aware of the unclear nature of metadata; without knowing exactly what AWS knows about customers, it is important to confirm who gets to see this information.

Metadata is subjective by definition

In general, metadata exists because of an artificial separation. Those who monitor the functioning of a public cloud actually use the metadata discussed above as their primary information. Metadata may also be much more important to a vendor for the end user than for a platform administrator. Consider the data breach at X in April 2025, when, in addition to email addresses, location data and the app from which a user sent a message were also compromised. Such data can be used just as effectively for a convincing phishing email as ‘primary’ information such as private messages. The use of the term ‘metadata’ here is only useful to soften the emotional impact of a data breach.

Popular fitness apps also tend to view location data as ‘metadata’, even though users’ GPS routes are so sensitive that they can locate someone’s home or reveal the existence of secret military bases. This loose interpretation of metadata does not necessarily stem from malicious intent. For a software team, the primary data normally consists of account information, settings, (private) messages, bank details, and more sensitive data. However, context is everything, and users rarely know what their data can reveal about them beyond their own profile.

The fact that developers do not always recognize the danger of metadata is evident from the fact that Git commits regularly reveal user names , workstation names, or the IDE used. Leaving extra information lying around that does not immediately appear to be sensitive has become a habit.

Within the specific context of a sovereign cloud, metadata suddenly becomes a visible weak spot, precisely because it is unclear and deliberately disclosed incompletely. This lack of clarity gives a hyperscaler leeway to store, even in good faith, additional information that keeps its own infrastructure running. This creates a gray area in which information about information can be very revealing in itself. Everything depends on the context in which it is found, and if that context reveals enough, the metadata is valuable. For this reason, it is important to ask yourself whether you, as a cloud user, can make yourself completely anonymous, regardless of the possibility of a malicious party gaining access through social engineering. For now, it seems more important to know who is collecting this data and why than what exactly that data says, whether it is called private data or metadata.

Also read: Is the AWS European Sovereign Cloud sovereign enough?

Tags:

cloud sovereignty / customer data / metadata

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Oracle: sovereignty is a matter of trust, not just technology

Europe’s data center market booms: is it ready to take on the US?

Microsoft Azure Local, 365 Local generally available: the cloud, offline

Red Hat launches digital sovereignty assessment tool

Editor picks

The RAMpocalypse is a warning for stricter performance KPIs

Something is rotten in the state of software development. The birth o...

Microsoft 365 E7 unveiled: biggest licensing change in ten years

Microsoft has confirmed to Techzine that it will be launching the Mic...

“Blind AI deployment leads to knowledge loss and software failures”

Artificial intelligence is rapidly being integrated into business pro...

ASML to build large new campus in Eindhoven

Space for 20,000 new ASML employees

Techzine.tv

"Not all clouds are created equal" in the AI era: how is OCI different?

"Not all clouds are created equal" in the AI era: how is OCI different?

Salesforce reveals its own Agentic IT Service Platform

Salesforce reveals its own Agentic IT Service Platform

AFX is NetApp's data platform of the future with integrated AI data prep

AFX is NetApp's data platform of the future with integrated AI data prep

What makes Salesforce agents reliable? Architecture explained

What makes Salesforce agents reliable? Architecture explained

Read more on Privacy & Compliance

Anthropic launches institute for AI risks

Anthropic launches institute for AI risks

Anthropic announces the establishment of the Anthropic Institute. This is a new research organization that fo...

Mels Dees 2 days ago
China tries its hand at advanced AI chips without Nvidia: will it succeed?
Top story

China tries its hand at advanced AI chips without Nvidia: will it succeed?

Vendor lock-in is a ubiquitous problem. Anyone looking for AI chips will find it difficult to bypass Nvidia. ...

Erik van Klinken September 2, 2025
European plans against Big Tech meet with criticism from businesses

European plans against Big Tech meet with criticism from businesses

European companies are concerned about plans from Brussels to reduce dependence on American technology compan...

Mels Dees 13 hours ago
EU Data Act in force as of today: companies free from cloud lock-in
Top story

EU Data Act in force as of today: companies free from cloud lock-in

The EU Data Act comes into force today in all member states. The legislation gives companies and consumers mo...

Berry Zwets September 12, 2025

Expert Talks

The Zero-Drift Frontier: Modern Edge Demands on Kubernetes

The Zero-Drift Frontier: Modern Edge Demands on Kubernetes

Edge computing has come to the fore. Too often, edge computing gets c...

When is an SBOM not an SBOM? CISA’s Minimum Elements

When is an SBOM not an SBOM? CISA’s Minimum Elements

In August 2025, CISA (the US Cybersecurity Infrastructure & Infra...

Sovereign: the new normal for AI and cloud native (and how to make it work)

As we head into KubeCon 2026 in Amsterdam, the word we keep hearing i...

A decade of Cloud Native at ING: Lessons learned, and what comes next

ING’s private cloud has been around for over a decade, and its clou...

Tech calendar

De IT Afdeling van de toekomst

March 31, 2026 Naaldwijk

GITEX ASIA 2026

April 8, 2026 Singapore

GITEX ASIA 2026

April 9, 2026 Singapore

Southeast Asia AI Application Summit 2026

April 23, 2026 Bangkok

SAS Innovate 2026

April 27, 2026 Grapevine

Team '26

May 5, 2026 Anaheim

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement