Are we digitally sovereign? Red Hat helps with the assessment
The open-source specialist Red Hat has provided an online tool that allows companies to assess and improve their digital sovereignty.
Many companies want or need to strengthen their resilience and independence due to regulatory requirements and wish to have control over their data. Red Hat has now developed an open-source tool to help with the inventory and illumination of options.
The Red Hat Digital Sovereignty Readiness Assessment Tool estimates, based on various questions such as "Can you migrate critical applications to different cloud platforms within a reasonable timeframe if necessary?" or "Do you have control over where your security and audit logs are stored?", how much control companies have over their digital assets. This is intended to help companies independently assess and improve their digital sovereignty.
The Digital Sovereignty Readiness Assessment Tool examines various aspects:
- physical and legal control over data (data sovereignty);
- composition of the software stack used (technical sovereignty);
- the ability to operate and restore all systems without external help (operational sovereignty);
- the ability to independently audit and validate the integrity of the systems;
- the use of open source to avoid vendor lock-in;
- the monitoring and alignment of sovereignty goals at the management level;
- the ability to flexibly deploy cloud environments in specific regions and data centers.
How sovereign are we?
Videos by heise
The tool categorizes companies' sovereignty into four maturity levels:
- Identification of requirements regarding digital sovereignty;
- active development of capabilities and closing of initial gaps;
- strong, repeatable capabilities in most areas;
- comprehensive, proactive control over the entire digital infrastructure.
Furthermore, the tool creates a roadmap with sensible steps for improving digital sovereignty and critical questions that those responsible in companies should ask themselves. Red Hat has published the source code as an open standard to ensure transparency and verifiability.
(odi)