{"id":11409,"date":"2026-03-31T10:42:03","date_gmt":"2026-03-31T08:42:03","guid":{"rendered":"https:\/\/www.cfi.ch\/?p=11409"},"modified":"2026-03-31T10:42:04","modified_gmt":"2026-03-31T08:42:04","slug":"microsoft-et-la-souverainete-des-donnees-cloud-en-suisse","status":"publish","type":"post","link":"https:\/\/cfi.ch\/en\/microsoft-et-la-souverainete-des-donnees-cloud-en-suisse\/","title":{"rendered":"Microsoft et la souverainet\u00e9 des donn\u00e9es cloud en Suisse"},"content":{"rendered":"<p data-block-type=\"core\"><\/p>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-077bc65\" data-block-id=\"077bc65\"><style>.stk-077bc65 {margin-bottom:15px !important;}<\/style><p class=\"stk-block-text__text\">Dans notre pr\u00e9c\u00e9dent article, nous vous parlions des<a href=\"https:\/\/cfi.ch\/en\/cloud-act-quels-criteres-prendre-en-compte-pour-choisir-son-cloud\/\" data-type=\"link\" data-id=\"https:\/\/cfi.ch\/cloud-act-quels-criteres-prendre-en-compte-pour-choisir-son-cloud\/\"> implications du Cloud Act et des crit\u00e8res essentiels pour choisir une solution cloud adapt\u00e9e<\/a>. <\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-81952db\" data-block-id=\"81952db\"><p class=\"stk-block-text__text\">Les organisations suisses \u00e9voluent dans un paysage r\u00e9glementaire o\u00f9 la question de la juridiction du fournisseur et du contr\u00f4le effectif des donn\u00e9es reste d\u00e9terminante. Les r\u00e9cents engagements de Microsoft en mati\u00e8re de souverainet\u00e9 num\u00e9rique en Suisse s\u2019inscrivent dans cette continuit\u00e9 et repr\u00e9sentent une \u00e9volution notable pour les organisations souhaitant concilier innovation et ma\u00eetrise renforc\u00e9e de leurs donn\u00e9es.<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-bd57b7f\" id=\"des-attentes-fortes-localisation-acces-et-controle\" data-block-id=\"bd57b7f\"><style>.stk-bd57b7f {margin-bottom:15px !important;}<\/style><h3 class=\"stk-block-heading__text\">Des attentes fortes : localisation, acc\u00e8s et contr\u00f4le<\/h3><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-c1cce79\" data-block-id=\"c1cce79\"><style>.stk-c1cce79 {margin-bottom:15px !important;}<\/style><p class=\"stk-block-text__text\">La souverainet\u00e9 num\u00e9rique repose aujourd\u2019hui sur trois questions structurantes :<\/p><\/div>\n\n\n\n<ul class=\"wp-block-list\" data-block-type=\"core\">\n<li data-block-type=\"core\">O\u00f9 les donn\u00e9es sont-elles stock\u00e9es ?<\/li>\n\n\n\n<li data-block-type=\"core\">Qui peut techniquement y acc\u00e9der ?<\/li>\n\n\n\n<li data-block-type=\"core\">Comment maintenir un contr\u00f4le op\u00e9rationnel complet tout en utilisant des services cloud modernes ?<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-f5c2cb6\" data-block-id=\"f5c2cb6\"><style>.stk-f5c2cb6 {margin-bottom:15px !important;}<\/style><p class=\"stk-block-text__text\">Microsoft place d\u00e9sormais ces enjeux au centre de son approche en Suisse, en explicitant les m\u00e9canismes destin\u00e9s \u00e0 garantir la ma\u00eetrise de la localisation et des acc\u00e8s aux donn\u00e9es, y compris dans les deux r\u00e9gions cloud suisses, situ\u00e9es vers Z\u00fcrich et Gen\u00e8ve.<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-496d088\" id=\"les-solutions-souveraines-proposees-par-microsoft\" data-block-id=\"496d088\"><style>.stk-496d088 {margin-bottom:15px !important;}<\/style><h3 class=\"stk-block-heading__text\">Les solutions souveraines propos\u00e9es par Microsoft<\/h3><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-0b0a14e\" data-block-id=\"0b0a14e\"><style>.stk-0b0a14e {margin-bottom:15px !important;}<\/style><p class=\"stk-block-text__text\">Pour r\u00e9pondre aux niveaux vari\u00e9s d\u2019exigence en mati\u00e8re de souverainet\u00e9, Microsoft propose deux mod\u00e8les principaux.<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-e9e518f\" id=\"sovereign-public-cloud\" data-block-id=\"e9e518f\"><style>.stk-e9e518f {margin-bottom:15px !important;}<\/style><h4 class=\"stk-block-heading__text\">Sovereign Public Cloud<\/h4><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-c9d7fb9\" data-block-id=\"c9d7fb9\"><style>.stk-c9d7fb9 {margin-bottom:15px !important;}<\/style><p class=\"stk-block-text__text\">Disponible dans toutes les r\u00e9gions europ\u00e9ennes, dont la Suisse, cette offre inclut :<\/p><\/div>\n\n\n\n<ul class=\"wp-block-list\" data-block-type=\"core\">\n<li data-block-type=\"core\">une r\u00e9sidence confirm\u00e9e des donn\u00e9es;<\/li>\n\n\n\n<li data-block-type=\"core\">des contr\u00f4les de chiffrement renforc\u00e9s;<\/li>\n\n\n\n<li data-block-type=\"core\">une gestion r\u00e9glement\u00e9e des environnements cloud.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-2fe2b4a\" data-block-id=\"2fe2b4a\"><style>.stk-2fe2b4a {margin-bottom:15px !important;}<\/style><p class=\"stk-block-text__text\">Aucune migration vers une infrastructure s\u00e9par\u00e9e n\u2019est n\u00e9cessaire, ce qui facilite son adoption tout en offrant des garanties de souverainet\u00e9 \u00e9tendues.<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-d352c64\" id=\"sovereign-private-cloud\" data-block-id=\"d352c64\"><style>.stk-d352c64 {margin-bottom:15px !important;}<\/style><h4 class=\"stk-block-heading__text\">Sovereign Private Cloud<\/h4><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-70499fa\" data-block-id=\"70499fa\"><style>.stk-70499fa {margin-bottom:15px !important;}<\/style><p class=\"stk-block-text__text\">Pour les organisations n\u00e9cessitant une autonomie accrue, Microsoft propose :<\/p><\/div>\n\n\n\n<ul class=\"wp-block-list\" data-block-type=\"core\">\n<li data-block-type=\"core\"><strong>Azure Local<\/strong>, permettant d\u2019ex\u00e9cuter les workloads dans des environnements contr\u00f4l\u00e9s par le client;<\/li>\n\n\n\n<li data-block-type=\"core\"><strong>Microsoft 365 Local<\/strong>, pour une exploitation locale pouvant fonctionner de mani\u00e8re autonome;<\/li>\n\n\n\n<li data-block-type=\"core\">une coh\u00e9rence de gouvernance entre cloud public, cloud priv\u00e9 et infrastructures hybrides.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-fac9895\" id=\"des-mecanismes-avances-pour-renforcer-la-souverainete\" data-block-id=\"fac9895\"><style>.stk-fac9895 {margin-bottom:15px !important;}<\/style><h3 class=\"stk-block-heading__text\">Des m\u00e9canismes avanc\u00e9s pour renforcer la souverainet\u00e9<\/h3><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-ad19a27\" data-block-id=\"ad19a27\"><style>.stk-ad19a27 {margin-bottom:15px !important;}<\/style><p class=\"stk-block-text__text\">Microsoft a introduit plusieurs dispositifs destin\u00e9s \u00e0 am\u00e9liorer encore la ma\u00eetrise op\u00e9rationnelle et r\u00e9duire les risques d\u2019acc\u00e8s non autoris\u00e9 :<\/p><\/div>\n\n\n\n<ul class=\"wp-block-list\" data-block-type=\"core\">\n<li data-block-type=\"core\"><strong>Data Guardian<\/strong> : les acc\u00e8s administratifs sont approuv\u00e9s et supervis\u00e9s exclusivement depuis l\u2019Europe,<\/li>\n\n\n\n<li data-block-type=\"core\"><strong>External Key Management<\/strong> : les cl\u00e9s de chiffrement restent sous le contr\u00f4le total du client,<\/li>\n\n\n\n<li data-block-type=\"core\"><strong>Regulated Environment Management <\/strong>: gouvernance centralis\u00e9e des environnements soumis \u00e0 des exigences r\u00e9glementaires,<\/li>\n\n\n\n<li data-block-type=\"core\"><strong>Azure Arc<\/strong> : gouvernance unifi\u00e9e pour les environnements multi\u2011cloud et on\u2011premises.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-d563ef7\" id=\"les-conclusions-a-en-tirer\" data-block-id=\"d563ef7\"><style>.stk-d563ef7 {margin-bottom:15px !important;}<\/style><h3 class=\"stk-block-heading__text\">Les conclusions \u00e0 en tirer<\/h3><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-c4f495e\" data-block-id=\"c4f495e\"><style>.stk-c4f495e {margin-bottom:15px !important;}<\/style><p class=\"stk-block-text__text\">Microsoft confirme une mont\u00e9e en puissance du cloud souverain en Europe et en Suisse, avec des solutions garantissant que les donn\u00e9es restent sous ces juridictions.<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-25eb416\" data-block-id=\"25eb416\"><style>.stk-25eb416 {margin-bottom:15px !important;}<\/style><p class=\"stk-block-text__text\">De plus en plus d&rsquo;informations sont transmises sur ces outils afin de rassurer les entreprises qui se questionnent sur la s\u00e9curit\u00e9 de leurs donn\u00e9es dans les solutions cloud de Microsoft.<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-acdc12c\" data-block-id=\"acdc12c\"><p class=\"stk-block-text__text\">N&rsquo;h\u00e9sitez pas \u00e0 nous contacter si vous souhaitez en savoir plus sur les diff\u00e9rentes possibilit\u00e9s actuelles !<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-206962c\" id=\"sources\" data-block-id=\"206962c\"><style>.stk-206962c {margin-bottom:15px !important;}<\/style><h3 class=\"stk-block-heading__text\">Sources<\/h3><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-66673a5\" data-block-id=\"66673a5\"><style>.stk-66673a5 {margin-bottom:15px !important;}<\/style><p class=\"stk-block-text__text\"><a href=\"https:\/\/blogs.microsoft.com\/blog\/2025\/06\/16\/announcing-comprehensive-sovereign-solutions-empowering-european-organizations\/\">https:\/\/blogs.microsoft.com\/blog\/2025\/06\/16\/announcing-comprehensive-sovereign-solutions-empowering-european-organizations\/<\/a><\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-2c8c2ac\" data-block-id=\"2c8c2ac\"><style>.stk-2c8c2ac {margin-bottom:15px !important;}<\/style><p class=\"stk-block-text__text\"><a href=\"https:\/\/news.microsoft.com\/source\/emea\/2026\/02\/how-microsoft-is-addressing-digital-sovereignty-in-switzerland\/\">https:\/\/news.microsoft.com\/source\/emea\/2026\/02\/how-microsoft-is-addressing-digital-sovereignty-in-switzerland\/<\/a><\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-9860fdc\" data-block-id=\"9860fdc\"><p class=\"stk-block-text__text\"><a href=\"https:\/\/www.microsoft.com\/fr-ch\/sovereignty?ocid=cmmc5frt31h&amp;li_fat_id=eb96187c-666b-44e8-bcc0-a2b2e8f4686a\">https:\/\/www.microsoft.com\/fr-ch\/sovereignty?ocid=cmmc5frt31h&amp;li_fat_id=eb96187c-666b-44e8-bcc0-a2b2e8f4686a<\/a><\/p><\/div>\n\n\n\n<p data-block-type=\"core\"><\/p>","protected":false},"excerpt":{"rendered":"<p>Dans notre pr\u00e9c\u00e9dent article, nous vous parlions des implications du Cloud Act et des crit\u00e8res essentiels pour choisir une solution cloud adapt\u00e9e. Les organisations suisses \u00e9voluent dans un paysage r\u00e9glementaire o\u00f9 la question de la juridiction du fournisseur et du contr\u00f4le effectif des donn\u00e9es reste d\u00e9terminante. Les r\u00e9cents engagements de Microsoft en mati\u00e8re de souverainet\u00e9 num\u00e9rique en Suisse s\u2019inscrivent dans cette continuit\u00e9 et repr\u00e9sentent une \u00e9volution notable pour les organisations souhaitant concilier innovation et ma\u00eetrise renforc\u00e9e de leurs donn\u00e9es. Des attentes fortes : localisation, acc\u00e8s et contr\u00f4le La souverainet\u00e9 num\u00e9rique repose aujourd\u2019hui sur trois questions structurantes : Microsoft place d\u00e9sormais\u2026<\/p>","protected":false},"author":4,"featured_media":11423,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-11409","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-non-classe"],"blocksy_meta":"","acf":[],"_links":{"self":[{"href":"https:\/\/cfi.ch\/en\/wp-json\/wp\/v2\/posts\/11409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cfi.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cfi.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cfi.ch\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cfi.ch\/en\/wp-json\/wp\/v2\/comments?post=11409"}],"version-history":[{"count":9,"href":"https:\/\/cfi.ch\/en\/wp-json\/wp\/v2\/posts\/11409\/revisions"}],"predecessor-version":[{"id":11426,"href":"https:\/\/cfi.ch\/en\/wp-json\/wp\/v2\/posts\/11409\/revisions\/11426"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cfi.ch\/en\/wp-json\/wp\/v2\/media\/11423"}],"wp:attachment":[{"href":"https:\/\/cfi.ch\/en\/wp-json\/wp\/v2\/media?parent=11409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cfi.ch\/en\/wp-json\/wp\/v2\/categories?post=11409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cfi.ch\/en\/wp-json\/wp\/v2\/tags?post=11409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}