EU Data Sovereignty on US Cloud Infrastructure

Use AWS, GCP, and Azure while keeping encryption keys under EU jurisdiction. The cloud provider stores only ciphertext.

US CLOUD (AWS / GCP / Azure)
frontendnginx:443
paymentsapi:8080
label: cloudtaser▶ Try Live Demo
analyticsspark:7077
worker-01batch:9090
postgresdb:5432label: cloudtaser
cron-jobsk8s:cron
ml-traingpu:3000
redis:6379label: cloudtaser
s3-proxy:8443label: cloudtaser
EU SECRET STORAGE
EU Secret Store Frankfurt, DE
DB_PASSWORD
DB_TLS_CERT
REDIS_AUTH_TOKEN
S3_ENCRYPT_KEY
S3_HMAC_SECRET
BANK_API_SECRET
BANK_MTLS_CERT
SIGNING_KEY
JWT_SECRET
01

The Problem

EU companies face a fundamental conflict when using US cloud providers.

Regulatory

Compliance Gap

GDPR, Schrems II, and sector regulations require that sensitive data stays under EU jurisdiction. US law (CLOUD Act, FISA) can compel access — even for EU-region data.

Cryptographic

Key Management Gap

Standard cloud encryption means the provider holds the keys. Customer-managed keys still pass through provider infrastructure. They can decrypt your data.

02

The Solution

A cryptographic boundary between your data and the cloud provider.

01

Secrets stay in EU vault

Database passwords, API keys, and encryption keys are stored in an EU-hosted secret store. Fetched directly into process memory — never written to Kubernetes Secrets, etcd, or disk.

02

Transparent sidecar injection

A Kubernetes admission webhook automatically injects a lightweight sidecar into your pods. No application code changes required.

03

Client-side encryption for storage

An S3-compatible proxy encrypts data before it leaves your cluster. Each object gets a unique AES-256-GCM key, wrapped through your EU vault. The cloud provider stores only ciphertext.

04

Runtime monitoring

eBPF-based monitoring detects attempts to access secrets through side channels — process environment reads, unexpected network exfiltration, and more.

See it in action

Interactive demos running on real infrastructure. No signup required.

03

Components

Each component handles one part of the sovereignty stack.

Operator Kubernetes sidecar injection Pre-MVP

Mutating admission webhook that automatically injects the CloudTaser wrapper into annotated pods. Resolves original container entrypoints from the registry, rewrites the command to launch through the wrapper, and mounts a shared volume for the wrapper binary.

Wrapper Secret fetching into process memory Alpha

Process wrapper that fetches secrets from your EU-hosted vault and injects them as environment variables into the target process. Secrets exist only in process memory — never on disk, never in Kubernetes Secrets. Supports token and Kubernetes auth methods.

S3 Proxy Client-side encryption for object storage Beta

S3-compatible reverse proxy that encrypts objects with AES-256-GCM before uploading. Each object gets a unique DEK, wrapped via Vault Transit — the cloud provider never sees plaintext or keys. Transparent to applications.

eBPF Agent Runtime secret monitoring Alpha

Kernel-level monitoring using eBPF tracepoints. Detects when processes attempt to read secrets through side channels like /proc/pid/environ, or when secret material appears in network write buffers.

CLI Discovery and deployment Alpha

Command-line tool for discovering existing secrets in a Kubernetes cluster and planning migration to CloudTaser. Scans for secrets referenced in pod specs and helps map them to vault paths.

Platform SaaS control plane Planned

Centralized management for access policies, audit logs, and observability across clusters. Web interface for managing vault connections, viewing secret access patterns, and configuring alerting.

04

How CloudTaser Compares

Standard cloud encryption vs. client-side encryption with EU key sovereignty.

Capability Cloud-Native Encryption CloudTaser
Provider sees plaintext Yes — they hold the keys No — ciphertext only
Keys under EU jurisdiction Keys in provider KMS EU-hosted vault
CLOUD Act exposure Provider can be compelled No keys to surrender
Application changes Varies None — transparent
Secret rotation Manual / provider-specific Automatic via vault leases