2.1 Data Location and Sovereignty
Data location provisions in cloud agreements have become critical compliance requirements. Regulatory mandates, sector-specific rules, and organizational policies increasingly dictate where data can be stored, processed, and accessed.
Understanding Data Sovereignty
Data sovereignty refers to the principle that data is subject to the laws and governance structures of the jurisdiction where it is located. For cloud deployments, this creates complex compliance challenges when data traverses multiple jurisdictions.
Indian Regulatory Framework
- DPDPA 2023: Digital Personal Data Protection Act permits cross-border transfers except to notified restricted countries
- RBI Guidelines: Payment system data must be stored only in India (data localization mandate)
- IRDAI Requirements: Insurance data retention and localization obligations
- SEBI Circulars: Securities market data handling and storage requirements
- Healthcare Data: Emerging requirements under draft Digital Health regulations
RBI mandates that all payment system data must be stored only in India. This includes end-to-end transaction details, customer data, and payment credentials. Foreign processing is permitted only if data is deleted abroad within 24 hours and stored domestically. Non-compliance can result in regulatory action including license revocation.
Contractual Provisions for Data Location
Cloud agreements must include specific, enforceable data location commitments:
| Provision | Purpose | Sample Language |
|---|---|---|
| Primary Data Location | Specify storage jurisdiction | "Customer Data shall be stored exclusively in data centers located within India" |
| Processing Location | Control where data is processed | "Processing of Customer Data shall occur only within approved regions" |
| Backup Location | Ensure backups comply | "Backup copies shall be maintained only in compliant jurisdictions" |
| Access Restrictions | Limit personnel access | "Provider personnel outside India shall not access Customer Data" |
| Change Notification | Advance notice of changes | "60-day prior notice before any data center relocation" |
Require cloud providers to maintain detailed data location documentation including: (1) Specific data center addresses, (2) Certification that sub-processors comply with location requirements, (3) Audit rights to verify data location, (4) Automatic termination rights for undisclosed location changes.
2.2 Security Certifications
Security certifications provide third-party validation of cloud provider security controls. Understanding certification scope, limitations, and contractual implications is essential for effective vendor assessment.
Key Certification Frameworks
ISO 27001 - Information Security Management
ISO 27001 is the international standard for information security management systems (ISMS). Certification demonstrates implementation of systematic security controls.
- Scope matters: Verify certification covers specific services you will use
- Statement of Applicability: Review which controls are implemented vs. excluded
- Recertification cycle: Confirm current validity and surveillance audit status
- Certifying body: Verify accreditation of the certification body
SOC 2 - Service Organization Controls
SOC 2 reports evaluate controls relevant to security, availability, processing integrity, confidentiality, and privacy based on AICPA Trust Services Criteria.
| SOC 2 Type | Coverage | Use Case |
|---|---|---|
| Type I | Design of controls at a point in time | Initial vendor assessment; new services |
| Type II | Operating effectiveness over a period (6-12 months) | Ongoing assurance; critical services |
Security: Protection against unauthorized access (common criteria - always included)
Availability: System availability for operation and use
Processing Integrity: Complete, valid, accurate, timely processing
Confidentiality: Protection of confidential information
Privacy: Personal information collection, use, retention, disposal
Additional Relevant Certifications
- CSA STAR: Cloud Security Alliance certification for cloud-specific controls
- PCI DSS: Required for payment card data processing
- HIPAA/HITECH: US healthcare data (relevant for global healthcare operations)
- FedRAMP: US government cloud requirements (relevant for US operations)
- MeitY Empanelment: Indian government cloud service provider requirements
Contractual Certification Requirements
- Maintain certifications: Require continuous certification maintenance throughout term
- Report access: Right to review full SOC 2 Type II reports (not just summaries)
- Scope coverage: Certifications must cover services provided under the agreement
- Notification of changes: Immediate notice of certification loss or scope reduction
- Termination rights: Right to terminate if material certifications are lost
Certifications have scope limitations. A provider may have ISO 27001 certification for one data center but not others, or SOC 2 coverage for infrastructure but not application-level controls. Always verify: (1) Certification scope matches your service, (2) Recent audit periods, (3) No material exceptions in reports.
2.3 SLA Requirements for Cloud Services
Service Level Agreements for cloud services differ significantly from traditional IT SLAs. Understanding cloud-specific metrics, measurement methodologies, and remedy structures is essential for effective service management.
Core Cloud SLA Metrics
Availability/Uptime
| Availability Level | Annual Downtime | Monthly Downtime | Typical Use Case |
|---|---|---|---|
| 99.0% | 3.65 days | 7.3 hours | Non-critical applications |
| 99.5% | 1.83 days | 3.65 hours | Standard business applications |
| 99.9% | 8.76 hours | 43.8 minutes | Important business services |
| 99.95% | 4.38 hours | 21.9 minutes | Critical services |
| 99.99% | 52.6 minutes | 4.38 minutes | Mission-critical |
Performance Metrics
- Response time: Time to first byte or complete page load
- Throughput: Transactions per second or data transfer rates
- Latency: Network round-trip time to service endpoints
- Error rates: Percentage of failed requests or transactions
SLA Exclusions and Carve-outs
Cloud providers typically exclude certain events from SLA calculations. Review exclusions carefully:
Vendors often exclude: (1) Scheduled maintenance windows - negotiate limits and advance notice, (2) Third-party service issues - ensure accountability for critical dependencies, (3) Customer-side issues - define clear demarcation points, (4) Beta/preview features - avoid production use, (5) API rate limiting - understand limits and consequences.
Service Credits and Remedies
Service credits are the standard cloud SLA remedy, typically calculated as a percentage of monthly fees based on actual availability achieved:
| Availability Achieved | Typical Service Credit | Negotiation Target |
|---|---|---|
| 99.0% - 99.9% | 10% of monthly fee | 15-25% |
| 95.0% - 99.0% | 25% of monthly fee | 30-50% |
| Below 95.0% | 50% of monthly fee | 100% + termination right |
Service credits rarely compensate for actual business impact. Negotiate additional protections: (1) Termination rights for chronic SLA failures, (2) Root cause analysis requirements, (3) Corrective action plans with timelines, (4) Escalation to senior management, (5) Carve-outs from liability caps for gross negligence.
2.4 Data Protection and Privacy
Cloud agreements must address comprehensive data protection requirements spanning Indian regulations (DPDPA 2023), sector-specific rules, and contractual obligations flowing from customer contracts.
DPDPA 2023 Compliance
The Digital Personal Data Protection Act, 2023 imposes obligations on both Data Fiduciaries (controllers) and Data Processors (processors). Cloud providers typically act as Data Processors, requiring specific contractual protections.
Required Processor Obligations
- Process only as instructed: Provider must not process data beyond agreement scope
- Security measures: Implement reasonable security safeguards
- Breach notification: Immediate notification of personal data breaches
- Deletion obligations: Delete data upon termination or instruction
- Sub-processor controls: Require equivalent obligations for sub-processors
Essential DPA Provisions
- Processing scope: Specific description of processing activities authorized
- Data categories: Types of personal data processed
- Security standards: Technical and organizational measures required
- Sub-processor approval: Prior consent for sub-processor engagement
- Audit rights: Customer right to audit or obtain third-party audit reports
- Breach procedures: Notification timelines and cooperation requirements
- Data subject requests: Assistance with rights requests
- Return/deletion: Post-termination data handling
DPDPA 2023 permits transfers to all countries except those specifically restricted by government notification. However, contractual protections should include: (1) Standard contractual clauses for transfers, (2) Supplementary measures where needed, (3) Transfer impact assessments for sensitive data, (4) Notification of legal demands for data access.
2.5 Business Continuity and Disaster Recovery
Cloud agreements must address business continuity requirements including disaster recovery capabilities, backup procedures, and recovery commitments to ensure organizational resilience.
Recovery Metrics
| Service Tier | RTO | RPO | Use Case |
|---|---|---|---|
| Standard | 24 hours | 24 hours | Non-critical workloads |
| Enhanced | 4 hours | 1 hour | Important business apps |
| Premium | 1 hour | 15 minutes | Critical applications |
| Mission Critical | Near-zero | Near-zero | Real-time systems |
Contractual BC/DR Requirements
- Documented BC/DR plans: Require provider to maintain and share plans
- Annual testing: Mandate regular DR testing with customer notification
- Geographic redundancy: Specify minimum distance between primary and DR sites
- Customer-initiated failover: Option to trigger DR in defined circumstances
- Communication procedures: Defined notification and escalation during incidents
Negotiate rights to: (1) Receive DR test results and reports, (2) Participate in annual DR exercises, (3) Conduct independent DR audits, (4) Receive immediate notification of DR failures, (5) Terminate if DR capabilities fall below committed levels.
Key Takeaways
- Data sovereignty requirements vary by sector - RBI mandates strict localization for payment data
- Security certifications have scope limitations - verify coverage matches your services
- Cloud SLAs require specific attention to exclusions, measurement, and remedy adequacy
- DPDPA 2023 requires comprehensive Data Processing Agreements with cloud providers
- BC/DR commitments should include specific RTO/RPO metrics with testing requirements
Knowledge Check
Test your understanding of SaaS and cloud service agreements