Skip to main content
Shot of a group of colleagues using a digital tablet together during a late night at work.
AI

Sovereignty as strategy: The new executive imperative

By Logan Wolfe
Partner, Global Enterprise Transformation, AI and Tech Strategy
Ideas lab | Apr 14, 2026 | Read time: 1 min

By Logan Wolfe, Partner, Global Enterprise Transformation, AI and Tech Strategy at Kyndryl

In the past few years, the idea of digital sovereignty has rapidly ascended the corporate agenda. Historically relegated to defensive compliance exercises or leveraged for vendor fearmongering, sovereignty had often been viewed as a compliance problem.

But for the modern C-suite, sovereignty principles should be seen as the fundamental risk model, and the ultimate driver of strategic optionality, operational agility and sustainable transformation.

Sovereignty principles directly relate to the control organizations have over their own data, technology and operations. Instead of thinking of digital sovereignty as a constraint, it can be a driver of strategic optionality, operational agility and sustainable transformation. In other words, planning for sovereignty also helps enterprises achieve fundamental and persistent technology goals: avoid vendor lock-in, build resilience, and protect their data and AI models.

The most urgent example is the pivot toward agentic AI, the autonomous, multi-agent systems capable of reasoning, planning and executing physical or digital actions across enterprise applications. While agentic AI offers enormous advantages for performance and efficiencies, it needs firm guardrails to keep it in check — otherwise, an agentic system can be a massive liability.

Operating on the principles of zero trust, a solid sovereignty framework also mandates that no user, device, vendor, or autonomous algorithmic agent is granted implicit trust without failover mechanisms. To deploy agentic systems safely, organizations must implement a robust layer of control that embeds policy as code directly into the architecture, bounding AI agents to operate within safe parameters.

The action plan

The good news is that digital sovereignty is not an abstract philosophy or unreachable for today’s enterprises. While it cannot be bought as a product, delegated to a single team or achieved via a one-time certification, it can be engineered as a continuous and fundamental layer of control across the domains of the sovereignty framework:

  • Data: Control over data location, governance, and access based on jurisdictional requirements
  • Operations: Control over IT and business ops, incident response, system visibility, and administrative access
  • Technology: Independence from foreign government control or interference in the technology stack

For executives, the starting point is to treat sovereignty the same way as enterprise risk: Define the scenarios you must survive, the outcomes you must preserve and the acceptable trade-offs you are willing to make.

Instead of starting your sovereignty journey with conversations that center on vendors and products (“Which sovereign cloud should we use?”), the most future-proof path begins with identifying requirements (“What must remain true under stress?”).

That means clarifying, in business terms, the sovereignty outcomes your enterprise must prioritize, including the jurisdictional requirements for both data and system administrators, as well as the risks posed by technologies concentrated in one vendor or geography.

Let’s consider two additional lenses that routinely break sovereign intent in the real world: cyber/assurance sovereignty, which is an enterprise’s ability to produce audit-ready evidence, comply with regulations, and withstand nation-state threat models; and economic sovereignty, which refers to the tariff, licensing, and supply-chain exposure that can abruptly change the cost or availability of critical technology.

Because sovereignty is a spectrum that often comes with trade-offs, the objective is not to “maximize sovereignty at all costs.” It is to align sovereignty levels to an enterprises’ essential needs and its risk tolerance, and to do so with clarity on cost, performance, resilience, and innovation compromises. A structured readiness assessment provides that clarity by aligning stakeholders and defining the scope of the program. The result should be a phased road map the defined responsibilities, owners and goals. 

When sovereignty is embedded into architecture and operations as policy-as-code, controls are automatically enforced, continuously monitored, and provably auditable. This is especially critical for agentic AI, where the “operator” may be an autonomous non-deterministic workflow that can move data and chain together decisions at machine speeds normally incompatible with critical-process risks. This does three things: (1) establishes cryptographic authority (who owns keys, who can decrypt, and where those keys can be used), (2) governs operational authority (who can change systems, respond to incidents, and approve agent actions), and (3) produces evidence (immutable logs, attestation, and compliance artifacts that demonstrate sovereignty continuously, not retroactively).

Once sovereignty outcomes and baseline maturity are clear, leaders can move from concept to execution by driving focused initiatives in each domain with clear and acceptable trade-offs. Here again, the goal is not to “re-platform everything,” but to reduce the vulnerabilities of the systems that matter most.

Data sovereignty can be achieved understanding the enterprises’ classes of data, the jurisdictions where they live and the laws that govern them. Risk can be reduced by isolating sensitive data and creating private AI patterns for local model training.

To support operational sovereignty, enterprises should identify their exposure to external systems, develop local alternatives and establish contingencies in the event of disruptions, such as sanctions imposed by foreign governments. Security should be based on a zero-trust paradigm that requires continuous identity verification and systems should be continuously monitored to detect drift and produce automatic audits.

Crucially, sovereignty will never be “done,” because the risk landscape will never stop moving. In these realities, a sovereign transformation must be run as an evergreen program with clear accountability: continuous assessments, continuous evidence generation, and a backlog of sovereign improvements mapped to business priorities.

Digital supply chains will continue to evolve, regulations will continue to multiply, AI agents will continue to gain capability.

Sovereignty-by-design then becomes a repeatable executive playbook: define outcomes, establish a baseline, prioritize the gaps that matter, and engineer sovereignty into the systems—so that humans and agents can operate at speed without surrendering control.

Optionality as the strategic imperative

As enterprises navigate change and embrace the high-risk, high-reward realities of the agentic economy, uninhibited technological growth without control and optionality is, ironically, a guaranteed recipe for falling behind.

Conversely, implementing a comprehensive sovereign strategy provides the ultimate strategic advantage. It allows the CIO to build high-performing environments without being locked into any vendor. It provides the CISO with zero-trust frameworks to defend against cyberattacks and enable safe innovation. And it enables the CRO and CDO to maintain absolute custodianship over the organization’s key data.

The future does not belong to the fastest adopter; it belongs exclusively to the deliberately sovereign enterprise. In this context, sovereignty principles are redefined as competitive advantages, not merely legal checkboxes or features of a single technology.

Logan Wolfe

Partner, Global Enterprise Transformation, AI and Tech Strategy

Get insights in your inbox

Subscribe to the newsletter

Speak to our experts.

Have questions or want to learn more?