Viewfinder logo

Sovereignty Readiness Assessment

Evaluate your knowledge on digital independence. This 7-domain assessment identifies your current knowledge on reliance and technical autonomy.

7 Critical Domains
Technical Sovereignty Executive Oversight Assurance Sovereignty Managed Services Open Source Data Sovereignty Operational Sovereignty
🏆 Leaderboard (Top 5)
Test 2026-01-23 62%
🔒 Privacy Policy
Data processed locally
No results saved unless opted-in
Leaderboard stores Name & Score
Certificates are private

Technical Sovereignty

Using a 'Single-Pane-of-Glass' tool from a vendor reduces technical lock-in. (Hint) Does this tool make it easier or harder to leave the ecosystem?
Open standards can help reduce vendor lock-in. (Hint) Think about how easily you could move this data to another host.
Proprietary 'Serverless' functions are easily portable. (Hint) Do these functions exist outside of the provider's specific ecosystem?

Executive Oversight

CEOs should worry about single-provider concentration. (Hint) What happens if your only provider has a major outage?
Sovereignty risk belongs on the Corporate Risk Register. (Hint) Is this a technical problem or a business continuity problem?
Digital Sovereignty is primarily a 'cost-saving' initiative. (Hint) Is the goal spending less money or having more control?

Assurance Sovereignty

You can verify integrity without source code access. (Hint) Can you be 100% sure what is 'under the bonnet' if you can't see it?
Regular penetration testing by an independent firm is a form of assurance sovereignty. (Hint) Does this provide neutral evidence of security?
Third-party audits are more reliable than vendor claims. (Hint) Is it better to take their word or see independent proof?

Managed Services

Total outsourcing increases internal expertise. (Hint) If you pay others to do the work, do your staff learn how to do it?
Managed services often obscure the 'Supply Chain' risk of underlying components. (Hint) Do you always know which 'sub-providers' your vendor uses?
Managed services can be used sovereignly. (Hint) Can a managed service be sovereign if the contract is right?

Open Source

OSS software is 100% secure by default. (Hint) Does having the code mean it was written perfectly?
The ability to audit the source code is the primary sovereignty benefit of OSS. (Hint) Think about finding hidden 'backdoors'.
OSS can be 'forked' if a vendor disappears. (Hint) Can you take the code and run it yourself if the company dies?

Data Sovereignty

Metadata (usage patterns, timestamps) is less sensitive than the data content itself. (Hint) Can someone reconstruct your behaviour just from timestamps?
A foreign cloud provider's home government can legally demand access to your data, even if it is stored locally. (Hint) Consider extraterritorial laws like the US CLOUD Act.
Provider-managed keys guarantee 100% data sovereignty. (Hint) Who really holds the master key in this scenario?

Operational Sovereignty

Sovereignty exists even if a vendor can unilaterally cancel your account. (Hint) If someone else holds the kill-switch, do you have autonomy?
Remote 'Emergency Access' by a vendor is acceptable in a sovereign environment. (Hint) Could this access be used without your supervision?
Local support staff are a requirement for many sovereign clouds. (Hint) Consider whose laws the actual human workers must follow.