EU/UK Data Sovereignty on US Cloud Infrastructure
Use AWS, GCP, and Azure while keeping encryption keys under EU/UK jurisdiction. The cloud provider stores only ciphertext.
Your EU/UK data is one court order away
EU and UK companies face a fundamental conflict when using US cloud providers.
Provider has full access to your data
Under the US CLOUD Act and FISA Section 702, US authorities can compel any US-headquartered cloud provider to hand over data — regardless of where it's stored. The provider holds the encryption keys, database credentials, and storage access.
Provider stores only ciphertext
CloudTaser implements what the EDPB calls "effective supplementary technical measures." The cloud provider physically cannot access your data in plaintext. A court order yields only ciphertext and no keys to decrypt it.
Three Layers of Defense
Each layer addresses a distinct attack vector. Together, they provide defense-in-depth that satisfies EDPB supplementary measures.
Secret Injection
Operator watches for annotated pods and injects the wrapper binary via init container. The wrapper authenticates to your EU vault using K8s service account tokens, fetches secrets, and launches your app with secrets in memory only.
Client-Side Encryption
Transparent S3 proxy sits between your app and cloud storage. Data is encrypted with keys from your EU vault before reaching the provider. Per-object envelope encryption with transient DEKs. Zero application changes.
eBPF Enforcement
DaemonSet deploys eBPF programs on every node. Kernel-level enforcement detects and prevents secret leakage through file writes, network exfiltration, core dumps, and process tracing at runtime.
Deploy in Under a Minute
Single Helm chart. Annotate your pods. Secrets are protected.
Deploy EU Vault
Set up OpenBao or HashiCorp Vault in an EU region under your control.
Install Operator
Single Helm chart deploys the operator, webhook, and eBPF agent.
Annotate Pods
Add cloudtaser.io/inject: "true" to your pod specs.
Done
Secrets are fetched from EU vault into process memory. Provider sees nothing.
Install via Helm
CloudTaser vs Traditional Approaches
| Capability | CloudTaser | K8s Secrets | External Secrets Operator | Vault Agent |
|---|---|---|---|---|
| Secrets bypass etcd | ✓ | ✕ | ✕ | ✓ |
| In-memory only (no disk) | ✓ | ✕ | ✕ | Partial |
| memfd_secret isolation | ✓ | ✕ | ✕ | ✕ |
| eBPF enforcement | ✓ | ✕ | ✕ | ✕ |
| Client-side S3 encryption | ✓ | ✕ | ✕ | ✕ |
| Zero app code changes | ✓ | ✓ | ✓ | Partial |
| EU jurisdiction keys | ✓ | ✕ | Depends | ✓ |
| Schrems II compliant | ✓ | ✕ | ✕ | Partial |
| Protection score | ✓ | ✕ | ✕ | ✕ |
Built for Regulated EU Enterprises
500-10,000 employees running production workloads on managed Kubernetes.
Financial Services
Banks, insurers, and payment processors subject to DORA, PSD2, and national financial regulators. Customer financial data must stay under EU jurisdiction.
Healthcare
Hospitals, health-tech, and insurance carriers handling patient data under GDPR special category protections and national health data regulations.
Government & SaaS
Government digital services and B2B SaaS companies serving EU customers who require contractual data residency guarantees.