IT Security Red Hat Publishes Tool for Measuring Digital Sovereignty

From Manuel Christa Manuel Christa | Translated by AI 2 min Reading Time

Related Vendors

How much control do companies really have over their data? A new online tool from Red Hat helps companies to objectively assess their digital sovereignty and create a roadmap for more independence.

Digital self-determination: Red Hat's new assessment tool helps companies regain full control over their IT infrastructure.(Image: AI-generated)
Digital self-determination: Red Hat's new assessment tool helps companies regain full control over their IT infrastructure.
(Image: AI-generated)

Companies need to modernize their IT infrastructure, but often become dependent on individual cloud providers. To solve this problem, Red Hat has introduced the "Digital Sovereignty Readiness Assessment Tool". The application enables those responsible to determine the status quo of their digital sovereignty using a questionnaire. As organizations need to strengthen their resilience due to strict regulatory requirements, the tool provides important guidance in complex technology landscapes.

The goal is transparency in often opaque software stacks. In practice, many companies fail due to data silos or "black box" solutions whose inner workings they cannot control. Red Hat provides an objective basis for assessing one's own ability to act. "Digital sovereignty is the ultimate strategic lever for innovation," emphasizes Hans Roth in his blog post on the introduction of the tool. According to Roth, sovereignty must form a foundation for making free decisions about the operation of workloads.

Seven Dimensions of Independence

The assessment covers seven areas that go beyond pure data sovereignty. In addition to data sovereignty, the tool checks technical and operational control. It determines whether teams can maintain systems without external help and restore them independently after failures. Only those who fully understand their IT environment can control it effectively and guarantee its operability.

Another focus is on independent verifiability and the use of open source approaches in order to avoid being tied to individual providers. Anchoring in the boardroom is also assessed, as sovereignty is a strategic decision for company management. After the test, users are classified into four maturity levels, from the basic phase to proactive control. As a result, they receive a roadmap with specific steps to close existing gaps in a targeted manner.

Open Standard Instead of Closed Systems

Red Hat has published the source code and evaluation criteria of the tool as open source. This is the provider's response to criticism of analysis tools, which themselves often remain opaque. "True independence cannot be verified in secret," writes Hans Roth in his article "How sovereign is your strategy?" to justify the open approach. The disclosure of the logic allows partners and customers to understand the results and adapt the framework for their own purposes. (mc)

Subscribe to the newsletter now

Don't Miss out on Our Best Content

By clicking on „Subscribe to Newsletter“ I agree to the processing and use of my data according to the consent form (please expand for details) and accept the Terms of Use. For more information, please see our Privacy Policy. The consent declaration relates, among other things, to the sending of editorial newsletters by email and to data matching for marketing purposes with selected advertising partners (e.g., LinkedIn, Google, Meta)

Unfold for details of your consent