Skip to content
ITIF Logo
ITIF Search

France’s Cloud Service Restrictions

France’s Cloud Service Restrictions
Knowledge Base Article in: Big Tech Policy Tracker
Last Updated: June 5, 2025

The Framework

France’s cloud security certification scheme, SecNumCloud, has emerged as one of the most protectionist digital regulations in Europe.[1] Administered by France’s national cybersecurity agency (ANSSI), the latest version of SecNumCloud (v3.2, March 2022) imposes stringent “sovereignty requirements” that effectively bar foreign cloud providers from qualifying as “trusted” vendors.[2] To gain certification—which is mandatory for public procurement and increasingly influential for firms operating in vital sectors such as health, energy, finance, and transport—providers must localize all customer and technical data in the EU, ensure all system support is conducted within the EU by EU-based personnel, and comply with ownership caps restricting non-EU shareholders to below 25 percent (individually) and 39 percent (collectively), with no veto rights or majority board control.[3] These conditions mirror regulatory models seen in China, and they undermine the distributed design of cloud infrastructure by making global service provision infeasible without creating duplicative EU-based operations. Despite being based on ISO 27001, a globally recognized framework for information security management systems (ISMS), the scheme’s technical aims are undermined by its geopolitical framing and economic exclusion, marking a stark departure from the principles of open digital markets and international cooperation.

Implications for U.S. Technology Leadership

France’s SecNumCloud restrictions significantly disadvantage U.S. cloud providers by creating an access barrier to a substantial portion of the European Union (EU) market. The certification requirements—such as strict ownership limits, mandatory local data storage, and personnel mandates based in the EU—make it practically impossible for most foreign firms to qualify. These constraints undermine the competitive neutrality of cybersecurity standards, tilt procurement in favor of French firms, and create a de facto closed market under the guise of trust and sovereignty. For U.S. firms, compliance would require costly and duplicative infrastructure and operations, eroding the efficiencies and global integration that underpin their service models.

Worse, France is pushing for these same sovereignty provisions to be embedded in the EU-wide cybersecurity scheme (EUCS), which would expand these market barriers across all EU member states. If successful, this could structurally exclude leading U.S. cloud providers from critical infrastructure, public sector contracts, and even private sector services governed under NIS2 and other cybersecurity laws. These measures not only fragment transatlantic digital cooperation, but also jeopardize the integrity of the Trans-Atlantic Data Privacy Framework and risk broader retaliation under trade law. If unaddressed, they set a precedent for protectionist digital standards masked as cybersecurity policy—posing a long-term threat to U.S. technology leadership in the global cloud market.[4]

Endnotes

[1] Nigel Cory, “Sovereignty Requirements in France—and Potentially EU—Cybersecurity Regulations: The Latest Barrier to Data Flows, Digital Trade, and Digital Cooperation Among Likeminded Partners,” Cross-Border Data Forum, December 10, 2021, https://www.crossborderdataforum.org/sovereignty-requirements-in-france-and-potentially-eu-cybersecurity-regulations-the-latest-barrier-to-data-flows-digital-trade-and-digital-cooperation-among-likemi/.

[2] Ibid.

[3] Ibid.

[4] Nigel Cory, “France’s ‘Sovereignty Requirements’ for Cybersecurity Services Violate WTO Trade Law and Undermine Transatlantic Digital Trade and Cybersecurity Cooperation,” Information Technology and Innovation Foundation, May 10, 2022, https://itif.org/publications/2022/05/10/france-sovereignty-requirements-cybersecurity-services-violate-wto-trade/.

Back to Top