Sovereign controls

Completed

The sovereign controls help public sector organizations meet several key regulatory frameworks. It can help you protect workloads by using advanced sovereignty and encryption controls. You can use different elements in the controls for your sovereign needs.

The following sections describe elements of the sovereign and encryption controls that are available in Microsoft Cloud for Sovereignty.

Protection against unauthorized access

You can implement world-class protection from unauthorized access by using advanced digital sovereignty and encryption controls. For more information, see Key management and certificate management in Microsoft Cloud for Sovereignty.

Protect your data and environment

You can protect your data that's in use and ensure that the cloud environment is verified as a trusted implementation environment before you process with Azure confidential computing, where available. For more information, see Azure confidential computing - Protect data in use.

Use Azure Key Vault

Azure Key Vault helps you deliver superior data sovereignty and availability with full administrative and cryptographic control of your Managed Hardware Security Modules (HSMs). For more information, see Azure Managed HSM Overview.

Use advanced data sovereignty policies

You can help protect workloads with advanced policies and logging that's designed to further protect the location and confidentiality of data, whether it’s at rest, in transit, or in use. For more information, see Confidential sample application in Sovereign Landing Zone.