Table of contents

Sovereignty has moved from a niche concern to a central issue in technology.

Digital innovation has made the world more connected and accessible — but power has not followed the same path. It has become increasingly concentrated.

As reliance on technology has grown, so too has dependency — and with it, a gradual loss of control.

At the heart of this shift is a fundamental principle:

Control in digital systems is determined by trust.

Digital trust underpins identity, authentication, encryption, and secure communication.

Public Key Infrastructure (PKI) is the mechanism through which digital trust is created and enforced.

PKI defines how trust is established, managed, and validated across systems.

If control of that infrastructure sits externally, then control of trust sits externally.

And if control of trust sits externally, sovereignty is inherently limited — regardless of where systems or data are hosted.

The False Trade-Off

Organisations are increasingly recognising this shift.

Governments, critical infrastructure providers, and regulated industries are reasserting control over trust, identity, and cryptographic authority.

At the same time, modern systems do not operate in isolation.

  • Supply chains are global
  • Services are interconnected
  • Trust must extend beyond organisational and national boundaries

This has led to a perceived trade-off:

  • Sovereignty = control, but isolation
  • Interoperability = connectivity, but dependency

This is a false dichotomy.

What Sovereignty Actually Means

Sovereignty is often reduced to a question of where systems are hosted.

In reality, sovereignty is about control.

It is typically expressed across three interconnected domains:

Data Sovereignty

Control over the location, access, and jurisdiction of data

Operational Sovereignty

Control over how systems are run, maintained, and governed

Technological Sovereignty

Control over technology choices and the ability to operate independently of external dependencies

Together, these define how organisations implement digital sovereignty.

But across all three, there is a common dependency:

Trust

Without control of trust:

  • Data sovereignty cannot be enforced
  • Operational sovereignty cannot be assured
  • Technological sovereignty cannot be sustained

This is where sovereignty is often misunderstood.

You may control infrastructure — but not the trust that secures it.

In practice, within PKI, this means control over:

  • Root trust anchors
  • Key material
  • Policy and issuance
  • Cryptographic operations

Without this, sovereignty is superficial.

Why Interoperability Cannot Be Sacrificed

While sovereignty is critical, interoperability remains non-negotiable.

Digital systems rely on:

  • Standards-based communication
  • Cross-domain authentication
  • Trusted exchanges between organisations

Without interoperability:

  • Systems fragment
  • Trust cannot be verified externally
  • Collaboration breaks down

Isolation is not security — it is limitation.

Designing for Both

The challenge is not choosing between sovereignty and interoperability.

It is designing systems that deliver both.

This requires:

1. Standards-Based Foundations

Trust must align to global standards so it can be recognised across ecosystems

2. Local Control of Trust

Root keys, policies, and issuance must remain under organisational control

3. Flexible Deployment Models

Infrastructure must operate across cloud, on-prem, and air-gapped environments without compromising trust

4. Independence from Centralised Trust Providers

Reliance on a small number of external trust authorities introduces systemic risk

A Shift in Trust Architecture

Historically, trust has been centralised.

A small number of providers manage trust for much of the digital ecosystem — prioritising convenience and reach, often at the expense of control.

A new model is emerging:

  • Distributed trust ownership
  • Standards-based interoperability
  • Locally controlled trust anchors

This is not fragmentation — it is resilience.

The Role of Sovereign PKI

PKI is not simply a component of digital infrastructure.

It is the control plane of digital trust.

A sovereign PKI approach enables organisations to:

  • Establish their own root of trust
  • Maintain full control over cryptographic operations
  • Anchor trust within their own jurisdiction
  • Integrate with global systems through recognised standards

In this model, interoperability is achieved through alignment, not dependency.

Looking Ahead

As digital systems evolve — driven by AI, automation, post-quantum cryptography, and increasing geopolitical complexity — the importance of digital trust will only grow.

Organisations will need to:

  • Anchor trust locally
  • Maintain control over critical infrastructure
  • Ensure cryptographic agility
  • Operate seamlessly across global ecosystems

Sovereignty and interoperability are not opposing forces.

They are complementary requirements of modern digital systems.

Closing Thought

Control of trust defines digital sovereignty — and true interoperability depends on how that trust is designed.