Use Cases
EU Data Act · EU AI Act · GDPR · NIS2
Public Sector: Open infrastructure that makes provider switching an operational decision
Most European government IT depends on a small number of non-European cloud providers. Switching is economically and technically prohibitive. Open, standardised infrastructure makes switching an operational decision rather than a multi-year engineering project.
The challenge today
Most European government IT depends heavily on a small number of infrastructure and software providers headquartered outside the EU. The EU Data Protection Supervisor has found that even EU institutions’ use of major productivity platforms can be non-compliant with GDPR (the General Data Protection Regulation). The servers, the telemetry, and the legal jurisdiction are not fully under EU control.
When governments try to leave, the economics are punishing. Providers charge per gigabyte for data leaving their networks. At the scale of a national government (terabytes of documents, databases, correspondence) the bill for downloading your own data can be substantial, making switching prohibitive even when the political will and budget exist.
Beyond cost, the technical lock-in is deeper: government applications built on proprietary cloud services (managed databases, identity systems, serverless workflows) have no direct equivalent on alternative infrastructure. Migration means rebuilding, which means years of engineering work and significant risk to operational continuity.
The EU Data Act requires cloud providers to eliminate egress fees for switching purposes. This removes one barrier. But the technical coupling to proprietary APIs remains, and most public sector organisations lack the in-house capacity to navigate it. NIS2 (Network and Information Security Directive), which classifies public administration as an essential entity, adds security baseline requirements for government IT, but meeting those requirements on infrastructure that is not fully under EU control creates an inherent tension that open, auditable infrastructure resolves.
What becomes possible with Apeiro
Gardener is the operational foundation: it manages Kubernetes clusters targeting any certified EU infrastructure provider (BSI C5-assessed operators, SecNumCloud-qualified facilities, national government data centres) using an identical control plane throughout. Because Gardener abstracts the provider through its Shoot cluster model, government applications are written against standard Kubernetes APIs, not proprietary cloud primitives. Migrating to a new provider is a change to the Shoot definition, not an application rebuild. Gardener’s built-in audit logging, etcd encryption, and cluster hardening documentation address NIS2’s security baseline requirements directly; its STIG (DISA Security Technical Implementation Guide) compliance support is designed precisely for regulated government environments.
OCM (Open Component Model) makes the compliance posture portable. Every deployed government workload is described as a signed, versioned delivery artifact (a Software Bill of Delivery) capturing what is running, which provider it is running on, and under what access controls. Konfidence’s immutable, reproducible deployment packages ensure that what ran on the previous provider and what runs on the new one are provably identical; migration fidelity is verifiable, not assumed. When an audit is requested, the evidence is in the artifact rather than assembled from provider-specific dashboards.
OpenKCM with HYOK (Hold Your Own Key) ensures that encryption keys for sensitive government data are held by the agency, not the infrastructure operator. Even on third-party EU-certified infrastructure, the agency retains the ability to revoke access to its data instantly. Greenhouse gives IT operations teams a unified compliance dashboard across all infrastructure, showing security posture, access controls, and incident alerts through a single operational layer that is not provided by or dependent on any particular cloud provider.
When government services need to interoperate (data shared between ministries, cross-agency processes, citizen-facing portals composing information from multiple back-end systems) ORD (Open Resource Discovery) and the UMS (Unified Metadata Service) provide standardised discoverability without bespoke integration work. openMFP and Luigi provide the composable frontend layer, allowing portal teams to assemble government-facing interfaces from independently operated micro-frontends without building a monolith.
Government AI deployments sit squarely in the EU AI Act’s high-risk categories: benefits assessment, permit processing, public safety, and recruitment systems all require fully auditable training data and documented decision logic. OCM records the AI training pipeline as a versioned, signed delivery artifact, capturing training framework version, model code, and infrastructure configuration alongside the regular workload deployment record. The software stack used for training is traceable and tamper-evident without a separate compliance process. Gardener provisions training infrastructure on EU-certified compute so that personal data used to train government AI models never leaves EU jurisdiction. OpenKCM HYOK ensures that even the infrastructure operator cannot access training data without the agency’s keys.
A scenario
A federal agency migrates a document management system from a non-EU provider to a BSI C5-certified EU cloud operator. Their workloads were packaged with OCM and deployed through Gardener. Migration is a Shoot cluster retargeting: Gardener provisions equivalent clusters at the new operator, OCM deploys the same signed artifacts identically. OpenKCM HYOK keys stay under the agency’s control throughout, with no re-encryption required. Greenhouse connects to the new infrastructure on day one, providing the same compliance dashboard and audit trail the agency had before. The NIS2 incident reporting capability, the GDPR processing records, and the data residency documentation all follow the workload automatically.
Apeiro is an open reference architecture — a collection of components and blueprints. Realising this scenario requires industry-specific knowledge, engineering investment, and integration expertise. Explore the technical foundations