Skip to content

Cryptographic sovereignty

Audience: CISOs, CIOs, Risk and Compliance leaders, Enterprise Architects

Reading time: 22 minutes

Prerequisites: Three doors, one solution recommended; The Cryptographic Control Plane for architectural context


The core thesis

Cryptographic keys must never leave the data owner's control domain.

Third parties and internal systems do not own keys. They are authorized to invoke cryptographic capabilities under strict, mediated, and auditable governance.

The principle of cryptographic sovereignty rests on three pillars:

Pillar Description
Sovereign control The data owner retains exclusive custody of all cryptographic key material
Mediated use Consumers invoke capabilities through a control plane — never accessing the key directly
Total auditability Every cryptographic invocation is logged with full context in the owner's domain

This page describes the principle, the structural problem it addresses, the paradigm shift it represents, and the cross-industry scenarios it solves.


The forces dismantling the traditional model

Four structural forces are dismantling the traditional model for third-party data exchange.

quadrantChart
    title Forces disrupting third-party data exchange
    x-axis Low complexity --> High complexity
    y-axis Low urgency --> High urgency
    quadrant-1 Critical
    quadrant-2 Monitor
    quadrant-3 Emerging
    quadrant-4 Accelerating
    Hyperconnected ecosystems: [0.75, 0.80]
    Growing regulatory pressure: [0.65, 0.90]
    Supply chain risk: [0.85, 0.85]
    Quantum computing horizon: [0.70, 0.60]

Hyperconnected ecosystems. Every enterprise today exchanges sensitive data with dozens or hundreds of third parties: suppliers, BPOs, fintechs, agencies, specialized vendors. The attack surface has multiplied.

Growing regulatory pressure. DORA, PCI-DSS 4.0, GDPR, SOX, data residency laws. The ultimate accountable party is always the data owner — not the third party.

Supply chain risk. The most costly breaches of recent years did not occur at the victim companies, but at their third parties. The perimeter no longer belongs to the enterprise.

Quantum computing on the horizon. Migrating to post-quantum cryptography is not optional. Doing it while maintaining control over multiple third parties multiplies operational complexity by an order of magnitude.


The structural problem: loss of control upon sharing

Under the traditional model, sharing data with a third party means losing control of it.

flowchart LR
    A["🏢 Your organization<br/>(data owner)"] -->|"key delivery /<br/>cleartext data"| B["🤝 Third party<br/>(full control over your data)"]

    B --> C["❌ No visibility into when<br/>or how data is used"]
    B --> D["❌ Cannot revoke access<br/>in real time"]
    B --> E["❌ No auditable evidence<br/>of usage"]
    B --> F["❌ Key lives outside<br/>your domain"]

    style A fill:#d6eaf8,stroke:#1a5276,stroke-width:2px
    style B fill:#fadbd8,stroke:#c0392b,stroke-width:2px
    style C fill:#fef9e7,stroke:#c0392b
    style D fill:#fef9e7,stroke:#c0392b
    style E fill:#fef9e7,stroke:#c0392b
    style F fill:#fef9e7,stroke:#c0392b

Once the key (or cleartext data) leaves the owner's domain, the following become impossible without bilateral coordination with the third party:

  • Real-time revocation of access
  • Knowing the exact scope of data consumption
  • Producing forensic evidence of individual operations
  • Limiting use to specific batches, time windows, or operation counts

The risk is structural. Even diligent third parties, following agreements scrupulously, cannot give the data owner what the architecture itself does not provide.


Consequences of losing cryptographic sovereignty

The risks span operational, regulatory, and strategic dimensions.

mindmap
  root((Loss of<br/>cryptographic<br/>sovereignty))
    Operational risk
      Third-party breach = your breach
      Irreversible sensitive data leakage
      Inability to cut access immediately
      Uncontrolled key duplication
    Regulatory risk
      SOX and PCI audit findings
      DORA non-compliance penalties
      Shared GDPR controller liability
      Exposure to civil litigation
    Strategic risk
      Operational dependency on the third party
      High cost of provider switching
      Barrier to new integrations
      Loss of market trust

The accountability problem. Regulatory frameworks make the data owner accountable for what third parties do with their data. The legal responsibility cannot be delegated. Yet the traditional architectural model — sharing keys — places control with the third party. The mismatch between accountability and control is the root of the risk.


The paradigm shift: from sharing keys to sharing capabilities

ANKASecure© introduces a fundamental inversion of the control model.

flowchart TB
    subgraph TRADITIONAL["❌ Traditional model — sharing a key"]
        direction LR
        T1["Data owner"] -->|"delivers key"| T2["Third party"]
        T2 --> T3["Possesses cryptographic material"]
        T2 --> T4["Uses it whenever and<br/>however they want"]
        T2 --> T5["Revocation requires<br/>bilateral coordination"]
        T2 --> T6["Audit depends on<br/>what the third party reports"]
    end

    subgraph ANKASECURE["✅ ANKASecure© model — sharing a capability"]
        direction LR
        A1["Data owner"] -->|"grants capability"| A2["Control Plane"]
        A2 -->|"mediated invocation"| A3["Third party"]
        A3 --> A4["Only what was authorized,<br/>when it was authorized"]
        A2 --> A5["Immediate revocation<br/>without depending on the third party"]
        A2 --> A6["Every execution logged<br/>in owner's domain"]
    end

    TRADITIONAL -.->|"paradigm shift"| ANKASECURE

    style TRADITIONAL fill:#fadbd8,stroke:#c0392b,stroke-width:2px
    style ANKASECURE fill:#d5f5e3,stroke:#1e8449,stroke-width:2px
Dimension Traditional model ANKASecure© model
What is shared The key A controlled capability
Who holds the key material The third party Always the data owner
Revocation Bilateral coordination required Immediate from the control plane
Audit Depends on third-party reporting Complete evidence in owner's domain
Usage scope Unrestricted Policy-bounded per invocation

The solution: ANKASecure© as a Cryptographic Control Plane

ANKASecure© is the control plane that governs how cryptography is used across systems and organizations — without ever exposing the keys that underpin it.

flowchart TB
    subgraph OWNER["Owner's control domain"]
        HSM["🔑 HSM<br/>Keys always here.<br/>Never leave."]
        POL["📋 Policies"]
        AUD["📊 Audit + Revocation"]
    end

    subgraph CCP["ANKASecure© — Cryptographic Control Plane"]
        AUTH["Authentication"]
        AUTHZ["Authorization"]
        REST["Restrictions"]
        MED["Mediation"]
        EV["Evidence"]
    end

    OWNER <--> CCP

    CCP -->|"invokes capability"| P1["🏦 Provider A<br/>e.g. VISA"]
    CCP -->|"invokes capability"| P2["💳 Provider B<br/>e.g. AMEX"]
    CCP -->|"invokes capability"| P3["🏭 BPO / Vendor<br/>e.g. embossing"]

    style OWNER fill:#d6eaf8,stroke:#1a5276,stroke-width:2px
    style CCP fill:#85c1e9,stroke:#1a5276,stroke-width:3px
    style P1 fill:#fdebd0,stroke:#d68910
    style P2 fill:#fdebd0,stroke:#d68910
    style P3 fill:#fdebd0,stroke:#d68910

Four foundational capabilities

Capability Description
Sovereign custody Keys live in the owner's HSM, within the owner's domain, under the owner's administration
Cryptographic mediation Every cryptographic operation is invoked — not executed directly — by the consumer
Policy-driven governance Who, what, on which material, in which context, and under which restrictions — all expressed as policy
Cryptographic evidence Every invocation is logged with full context and forensic traceability

For the broader architectural treatment of the control plane, see The Cryptographic Control Plane.


How it works

The key never moves. The capability does — governed, restricted, and audited.

sequenceDiagram
    participant TP as Third party / System
    participant CCP as ANKASecure©<br/>Control Plane
    participant POL as Policy engine
    participant HSM as HSM<br/>(Owner's domain)
    participant AUD as Audit log

    TP->>CCP: Invocation request (capability, context, actor)
    CCP->>POL: Evaluate policy for this actor + context
    POL-->>CCP: Decision: Permit / Deny (with constraints)

    alt Permitted
        CCP->>HSM: Execute cryptographic operation
        HSM-->>CCP: Result (never the raw key)
        CCP->>AUD: Log: actor, context, capability, restrictions, timestamp
        CCP-->>TP: Response (result only)
    else Denied or restricted
        CCP->>AUD: Log: denied invocation with reason
        CCP-->>TP: Rejection with policy code
    end

Critical invariant: The HSM never exposes raw key material to the Control Plane, to the third party, or to any external system. Operations are executed inside the HSM boundary; only the cryptographic result is returned.


The conceptual model behind sovereign exchange

ANKASecure© materializes sovereign control through five conceptual blocks. These map directly to entities in the deployment organization model.

flowchart LR
    EC["1️⃣ Exchange Context<br/>The exchange relationship<br/><br/>Models the third-party exchange:<br/>with whom, for what purpose,<br/>in which direction, with what sensitivity"]
    CA["2️⃣ Cryptographic Actor<br/>Who executes<br/><br/>The operational identity of the<br/>third party or system that actually<br/>invokes cryptographic operations"]
    CAP["3️⃣ Capability<br/>What they can do<br/><br/>The abstract cryptographic function<br/>— encrypt, sign, verify — decoupled<br/>from the material that underpins it"]
    CAS["4️⃣ Cryptographic Asset<br/>With which material<br/><br/>The key or cryptographic material.<br/>Lives in the owner's HSM.<br/>Never delivered — only mediated"]
    CP["5️⃣ Constraint Policy<br/>Under which restrictions<br/><br/>Usage rules: time window, max<br/>invocations, batch scope,<br/>automatic revocation"]

    EC --> CA --> CAP --> CAS --> CP

    style EC fill:#d6eaf8,stroke:#1a5276,stroke-width:2px
    style CA fill:#d5f5e3,stroke:#1e8449,stroke-width:2px
    style CAP fill:#fdebd0,stroke:#d68910,stroke-width:2px
    style CAS fill:#e8daef,stroke:#7d3c98,stroke-width:2px
    style CP fill:#fadbd8,stroke:#c0392b,stroke-width:2px

Together, these five blocks answer a single compound question:

Who can do what, on which material, in which context, under which conditions — with complete evidence.

The composition

erDiagram
    EXCHANGE_CONTEXT ||--o{ CRYPTOGRAPHIC_ACTOR : "authorizes"
    EXCHANGE_CONTEXT ||--o{ CAPABILITY : "permits"
    CAPABILITY ||--|| CRYPTOGRAPHIC_ASSET : "operates on"
    EXCHANGE_CONTEXT ||--o{ CONSTRAINT_POLICY : "governed by"
    CRYPTOGRAPHIC_ACTOR ||--o{ CONSTRAINT_POLICY : "subject to"

    EXCHANGE_CONTEXT {
        string id
        string name
        string counterparty
        string purpose
        string data_direction
        string sensitivity_level
    }
    CRYPTOGRAPHIC_ACTOR {
        string id
        string identity
        string actor_type
        string authentication_method
    }
    CAPABILITY {
        string id
        string function_type
        string algorithm_family
        string operation
    }
    CRYPTOGRAPHIC_ASSET {
        string id
        string asset_type
        string hsm_slot_ref
        string key_family
    }
    CONSTRAINT_POLICY {
        string id
        datetime valid_from
        datetime valid_until
        int max_invocations
        string batch_scope
        bool auto_revoke_on_breach
    }

The full treatment — including the additional entities (Deployment, Tenant, Application, Credential, Capability Grant, Policy, Audit Event) that round out the twelve-entity model — is in the deployment organization model.


Banking scenario: card issuance with multiple embossing providers

A bank issues cards through VISA, AMEX, and a local provider. Each must decrypt sensitive cardholder data to produce the physical card. Sharing keys multiplies risk.

flowchart TB
    BANK["🏦 Bank<br/>Card Issuance Application<br/><br/>🔑 All keys here — always"]

    BANK --> CCP

    subgraph CCP["ANKASecure© Control Plane"]
        EC1["Exchange Context: Embossing-VISA<br/>decrypt · single-use · batch #2847 · 2h window"]
        EC2["Exchange Context: Embossing-AMEX<br/>decrypt · single-use · batch #AX-9012 · 4h window"]
        EC3["Exchange Context: Embossing-Local<br/>decrypt · rate-limit 500/h · daily window"]
    end

    EC1 --> VISA["💳 VISA<br/>visa-embossing-actor"]
    EC2 --> AMEX["💳 AMEX<br/>amex-embossing-actor"]
    EC3 --> LOCAL["🏷️ Local issuer<br/>local-issuer-actor"]

    style BANK fill:#d6eaf8,stroke:#1a5276,stroke-width:2px
    style CCP fill:#85c1e9,stroke:#1a5276,stroke-width:3px
    style VISA fill:#fdebd0,stroke:#d68910
    style AMEX fill:#fdebd0,stroke:#d68910
    style LOCAL fill:#fdebd0,stroke:#d68910

Outcomes for the bank

Outcome Detail
Total isolation between providers VISA never sees AMEX material. A compromise is surgical, not systemic
Zero key exposure No provider ever receives a key. They only execute capabilities the bank allows
Immediate revocation without coordination Provider change or incident → instantaneous cutoff from the control plane
Audit-ready evidence Every invocation logged: actor, context, capability, restrictions applied
Per-provider policies VISA has different rules from AMEX — modeled natively without duplicating infrastructure
Per-batch operational control Each batch is individually authorized with its own window and usage limit

The fully modeled scenario — entities, attributes, capability grants, constraints — is in Reference scenarios.


Banking scenario: BPO collections and outsourced processing

A BPO operates on behalf of the bank over delinquent customer data. Today, it receives decrypted CSV files. With ANKASecure©, it operates on controlled capabilities — never receiving bulk cleartext.

flowchart LR
    subgraph TODAY["❌ Today — without sovereign control"]
        direction TB
        S1["Bank decrypts the portfolio"]
        S2["Sends CSV files to BPO via SFTP"]
        S3["BPO operates on cleartext data"]
        S4["Bank has no visibility into BPO's data use"]
        S5["Files remain on BPO servers"]
        S6["Revoke = rewrite entire ETL process"]
        S1 --> S2 --> S3 --> S4 --> S5 --> S6
    end

    subgraph ANKA["✅ With ANKASecure©"]
        direction TB
        A1["Bank defines Exchange Context: BPO-Collections"]
        A2["BPO is a controlled Cryptographic Actor"]
        A3["Each individual decryption is an invocation"]
        A4["Restrictions: record-by-record, business hours only"]
        A5["Every operation logged in bank's audit domain"]
        A6["Revocation: immediate from the console"]
        A1 --> A2 --> A3 --> A4 --> A5 --> A6
    end

    style TODAY fill:#fadbd8,stroke:#c0392b,stroke-width:2px
    style ANKA fill:#d5f5e3,stroke:#1e8449,stroke-width:2px

The full modeling — actors, contexts, grants, constraints — is in Reference scenarios.


Beyond banking: cross-industry applicability

The same conceptual model solves sovereign control scenarios across multiple industries.

mindmap
  root((ANKASecure©<br/>Cryptographic<br/>Control Plane))
    Financial services
      Card issuance
      BPO collections
      Regulatory reporting
      Embedded fintechs
      Open banking
    Government & defense
      Inter-agency exchange
      Contractors
      Binational interoperability
      Sovereign signing
    Healthcare
      Shared clinical records
      External laboratories
      Insurers
      Clinical research
    Telecommunications
      Partner data sharing
      Roaming
      MVNOs
      CDR exchange
      IPX interconnection
    Retail & value chains
      EDI with suppliers
      Federated loyalty
      Outsourced logistics
      Marketplaces
    Software & SaaS
      Multi-tenancy
      B2B integrations
      Data processors
      Enterprise BYOK

One conceptual model. One product. Dozens of regulated scenarios where the data owner must retain control.


Business benefits by stakeholder

flowchart TB
    subgraph CEO["👔 For the CEO / Board"]
        C1["Structural reduction of third-party risk"]
        C2["Defensive posture against litigation and penalties"]
        C3["Enabler for new commercial integrations"]
        C4["Competitive differentiator with regulated clients"]
    end

    subgraph CISO["🛡️ For the CISO"]
        CI1["Real cryptographic sovereignty — not declarative"]
        CI2["Reduced attack surface from third parties"]
        CI3["Complete evidence for audits and forensics"]
        CI4["Instant revocation without external coordination"]
    end

    subgraph CTO["⚙️ For the CIO / CTO"]
        CT1["Single control plane for all third parties"]
        CT2["Crypto-agility: migrate algorithms without touching apps"]
        CT3["Native post-quantum readiness"]
        CT4["Standard integration with HSMs and existing ecosystem"]
    end

Quantifiable value

Metric Value
Reduction in third-party onboarding time to the cryptographic ecosystem −70%
Keys shared with providers, BPOs, or external integrations 0
Effective revocation upon incident (without coordinating with the third party) < 1 minute
Auditable evidence of every cryptographic operation with full context 100%

Additionally, the model accelerates post-quantum cryptography adoption without rewriting applications — a migration that without a control plane takes years.


Regulatory compliance alignment

ANKASecure© is natively aligned with the regulatory frameworks that matter most to regulated industries.

flowchart LR
    CCP["ANKASecure©<br/>Cryptographic<br/>Control Plane"]

    CCP --> DORA["📜 DORA<br/>Digital Operational<br/>Resilience Act · EU<br/><br/>Third-party ICT risk management<br/>with evidence of controls"]
    CCP --> PCI["📜 PCI-DSS 4.0<br/>Card industry · Global<br/><br/>Key custody and segregation;<br/>control over service providers"]
    CCP --> SOX["📜 SOX<br/>Sarbanes-Oxley · USA<br/><br/>Controls over financial systems<br/>with complete traceability"]
    CCP --> GDPR["📜 GDPR<br/>Data protection · EU<br/><br/>Controller accountability<br/>over processors"]
    CCP --> CNSA["📜 CNSA 2.0<br/>Post-quantum · USA NSA<br/><br/>Transition to quantum-resistant<br/>algorithms"]

For the regulatory dimension as a CAPA pillar, see Pillar 5 — Regulatory Compliance.


If you want to… Read…
Understand the architectural shift The Cryptographic Control Plane
Learn the operational framework The CAPA framework, particularly Pillar 2 — Cryptographic Sovereignty
See the full deployment organization model Deployment organization model
Walk through detailed entity composition Entity reference
Read fully modeled enterprise scenarios Reference scenarios
Map your current cryptographic maturity The Cryptographic Maturity Model

Summary

Cryptographic sovereignty means the data owner retains exclusive custody of cryptographic key material. Third parties never receive keys — they receive the right to invoke capabilities, mediated and audited.

This principle inverts the traditional model of third-party data exchange. The shift from sharing keys to sharing capabilities is what makes governed cross-organization cryptography possible.

The same model that supports internal cryptographic governance, cross-jurisdiction operations, and post-quantum migration also supports sovereign third-party exchange — because all three are facets of the same architectural shift.