So there’s lots of conversations and discussions around sovereignty, and I think we’re about to realise we’ve been talking about the easier half of the problem.
For the last couple of years, “sovereignty” has mostly meant infrastructure choices, data residency, and legal jurisdiction. Important, yes. But familiar. We have patterns for it.
Then a different question started popping up in conversations: what about the sovereignty of tacit knowledge in your business?
That’s a really good point. And it’s messy.
Because tacit means within people’s head. Not explicit. Not neatly sitting in a database. And if you and your competitors are using the same AI tools, profit margin will be the only thing left if you cannot protect what makes you different.
Doesn’t matter how much you spend on encryption if your uniqueness walks out the door every Friday evening.
Let’s give credit where it’s due. Data sovereignty has moved from vague anxiety to concrete procurement frameworks, contract clauses, and architectural patterns.
Leaders now have a clearer menu of options:
And that is the point. This part is becoming knowable.
Even so, it is still not a “tick-box and forget it” topic. It’s a board-level risk conversation because it touches continuity, customer trust, and regulatory exposure.
"At a basic level, data sovereignty is about control and responsibility. Who owns the data? Who decides how it’s used? Where it lives? And what values shape those decisions. We’re already seeing countries like Denmark push harder on this, questioning dependence on massive platforms and foreign cloud infrastructure. Not to retreat from the world, but to regain agency."
José Aron-Diaz, PMP, ACP
You can hear the shift in that framing. This is not only a technology decision. It is an agency decision.
Here’s the thing. Most businesses are still acting like sovereignty is only about where data sits.
But competitive advantage is often not the data itself. It is how your people interpret it, use it, decide with it, and act on it.
That is tacit knowledge.
And I’m not sure anybody is 100% sure what “tacit sovereignty” even means yet.
But I do think we can describe the failure mode:
That’s a grim strategy.
In leadership circles, the scenario is not always “hackers break in”.
It is “jurisdiction goes wrong”.
If you are operating in Europe, the promise of sovereign cloud is that these risks become less existential.
And to be fair, the market is responding. We are seeing clearer sovereignty objectives, more explicit procurement standards, and more mature supplier offerings.
But this is where it gets interesting:
Even if the infrastructure risk is reduced, you still have a second-order risk.
Your “tacit edge” can be extracted socially, operationally, or accidentally. And AI accelerates that extraction.
This is the part that makes leaders uncomfortable, because it is nobody’s fault and everybody’s responsibility.
AI changes how tacit knowledge escapes:
Also, sovereignty has moved beyond compliance language into market language.
"You cannot achieve AI sovereignty without first securing data sovereignty. For nations and enterprises alike, this is no longer just a compliance discussion, it is a strategic imperative for control."
Khurrum Ghori PMP
The control conversation is evolving. And the more AI gets embedded into how work happens, the more “control” means more than data location.
We can encrypt data. We can secure systems. Those patterns are well understood.
But tacit knowledge is not only “data at rest”. It is:
You can store fragments of it:
But even then, you are not “capturing the human”. You are capturing a trace.
That’s not a bad thing. It is still valuable. But leaders need to be honest about what can be made explicit and what must remain human.
And I think relationships are the real curveball. In some organisations, the relationship is the tacit. And I’m not sure you can store that into a model. Maybe you can. Maybe you can’t.
If you need a working definition for leadership conversations, try this:
Tacit sovereignty is not about owning people.
It is about:
This stuff is genuinely hard. So I like 30-day moves that create momentum without pretending the whole thing is solvable in a quarter.
Choose two or three capture methods and pilot them:
If you do nothing else, make it operational.
Roles
Rituals
Logs
This is what makes sovereignty real. Not a slide deck.
These are the signals I look for when tacit sovereignty is already leaking:
If any of those feel familiar, it is not a reason to panic.
It is a reason to get started.
We can keep talking about sovereign cloud and secure data centres. We should.
But the next frontier is tacit sovereignty, and it is going to decide who stays differentiated when the tools are the same for everyone.
That’s going to be an interesting journey for 2026.
AWS named Leader in the 2025 ISG report for Sovereign Cloud Infrastructure Services (EU)
https://aws.amazon.com/blogs/security/aws-named-leader-in-the-2025-isg-report-for-sovereign-cloud-infrastructure-services-eu/
Trust rating: high
Reason: Practical, current view of how “sovereign-by-design” is being implemented in EU sovereign cloud offerings.
Date written: 2026-01-09
Europe Seeking Greater AI Sovereignty, Accenture Report Finds
https://newsroom.accenture.com/news/2025/europe-seeking-greater-ai-sovereignty-accenture-report-finds
Trust rating: high
Reason: Research-led snapshot of the European push toward AI sovereignty and the strategic trade-offs leaders are navigating.
Date written: 2025-11-03
2025 Priorities and Trends for Knowledge Management
https://www.reworked.co/knowledge-findability/2025-priorities-and-trends-for-knowledge-management/
Trust rating: high
Reason: Directly relevant discussion of tacit versus explicit knowledge and the organisational challenge of capturing what is in people’s heads.
Date written: 2025-03-04
Digital Sovereignty in Europe in 2025: What's 'Plan B'?
https://www.idc.com/resource-center/blog/digital-sovereignty-in-europe-in-2025-whats-plan-b/
Trust rating: high
Reason: Analyst perspective on real-world sovereignty risks, including jurisdiction and forced exits, and how organisations respond pragmatically.
Date written: 2025-08-27
Cloud Sovereignty Framework - European Commission
https://commission.europa.eu/document/download/09579818-64a6-4dd5-9577-446ab6219113_en
Trust rating: high
Reason: Authoritative definition of sovereignty objectives in EU institutional cloud procurement.
Date written: 2025-10-27
LinkedIn (Snigdha Dewal)
https://www.linkedin.com/pulse/taming-cloud-unlocking-trust-data-sovereignty-2025-snigdha-dewal-fbrxc
Trust rating: high (derived from validated source list)
Reason: Evidence that privacy expectations and trust pressures are now central to sovereignty discussions.
Date: 2025-06-15
LinkedIn (José Aron-Diaz, PMP, ACP)
https://www.linkedin.com/pulse/data-sovereignty-dummies-because-thats-how-i-learned-josé-atuze
Trust rating: high (derived from validated source list)
Reason: Plain-English definition of sovereignty focused on control, responsibility, and agency.
Date: 2025-12-28
LinkedIn (Khurrum Ghori PMP)
https://www.linkedin.com/pulse/ai-sovereignty-begins-data-unavoidable-truth-first-step-ghori-pmp-pcisf
Trust rating: high (derived from validated source list)
Reason: Clear linkage between data sovereignty and AI sovereignty, framed as strategic control.
Date: 2026-01-05