SovereigntyGap.

Reading a Profile — CIO angle

Reading guide by persona
How a CIO makes use of a Sovereignty Profile: operational continuity, workaround plans, escrow.

Reading a Profile — CIO angle#

Reading a Profile when one carries operational continuity in front of an executive committee — and must hold this responsibility over the long term.

Your stake#

A CIO does not read a Profile to be informed; they read it to answer. To answer their executive committee if the provider closes, is acquired, loses its principal maintainers, changes license or sees its host shift outside an acceptable jurisdiction. The Profile is useful because it makes visible what the provider’s commercial argument hides: the actual chain, hence the actual breaking points. A salesperson sells a feature; a Profile exposes the dependency that underpins it, the hosting that carries it, the governance that decides its trajectory. It is this readability of the chain that distinguishes a Profile from a brochure. For a CIO, a document that does not help anticipate breakage is a document they will not read — so reading a Profile consists first in checking that it says enough about breakage to be useful.

A 5-minute reading#

Five fields suffice to decide whether a Profile deserves an in-depth reading or whether one should ask the provider to complete it.

  • Date of update. A Profile that is undated or frozen for more than eighteen months no longer describes the current chain. A provider that does not retouch its Profile after a fundraising, a change of host or a component acquisition shifts the work of updating onto the buyer.
  • Domain 4 — effective hosting. Not the provider’s registered office: where data is actually stored, under which jurisdiction, and with which contractual guarantees. A Profile that is ambiguous on this point generally is so because the answer is awkward.
  • Domain 5 — continuity. Presence or absence of escrow, of release-on-trigger clause, of a tested reversibility plan. If the domain describes an intention without a mechanism, it is an empty domain dressed as a full one.
  • Domain 1 — strategic components. Identify the single-vendor bricks whose disappearance would stop the service. A Profile that mentions these bricks without an alternative considered announces its own fragility.
  • Domain 7 — assumed limits. A serious provider names its limits. A domain 7 that is empty or reduced to platitudes (“we commit to quality”) signals a Profile that has not been written to be useful to a demanding buyer.

In-depth reading#

Seven domains, seven illuminations from the CIO angle. This section does not rewrite the educational sheets of the domains — it says what a CIO draws from them in order to decide.

Domain 1 — Strategic components#

Reading domain 1 amounts to identifying the list of bricks on which the provider itself rests. For the CIO, this is the cartography of possible upstream breakages: if one of them shifts to hard vendor lock-in or disappears, the service you consume is hit in cascade.

Domain 2 — Contingency plans#

Domain 2 says what happens if a brick from domain 1 falls. A theoretical plan without a test is not a plan; a tested plan with a quantified switchover lead time is operational information usable in a continuity plan.

Domain 3 — Supply chain#

The distribution says who else operates the same brick, and hence how many organisations share the same breaking points. A rich field is an assurance of shared maintenance effort; a thin field signals that in the event of failure you will be alone in rebuilding.

Domain 4 — Hosting and data#

Domain 4 is the terrain on which the CIO plays most directly. Beyond the effective jurisdiction, the entire hosting chain must be read: who hosts whom, which technical subcontractors, which extraterritorial obligations actually apply to the data processed.

Domain 5 — Continuity#

Domain 5 is the heart of the CIO reading. A documented escrow, a release-on-trigger clause that can be triggered on specific events, a reversibility procedure that has been executed at least once under real conditions: these three elements turn a promise into a mechanism.

Domain 6 — Governance and capital#

Governance is not the CIO’s primary terrain, but it conditions continuity: a provider whose shareholders’ agreement allows a transfer at any time, or whose capital is exposed to the golden power of a third State, can shift without notice useful to your migration calendars.

Domain 7 — Commitments and assumed limits#

Domain 7 is the Profile’s test of sincerity. The CIO looks there less for positive commitments than for named limits: a provider that writes “we do not carry the disaster recovery plan, it is for the user organisation to set it up” says something usable. A provider that writes only intentions says nothing.

Warning signs#

Six signals that should trigger a request for complement before signature or renewal. None on its own suffices to disqualify; their accumulation, on the other hand, indicates a Profile that does not support a serious purchase decision.

  • No tested workaround plan. Domain 2 is empty or described in theory, without a quantified lead time or mention of repetition. Consequence: your continuity plan will rest on a test that no one will have conducted.
  • Undocumented extra-European hosting. Domain 4 remains evasive on the effective jurisdiction of the data, or mixes the registered office and the location of the servers. Consequence: unpredictable exposure to extraterritorial obligations that you will discover on incident.
  • Unique non-substitutable dependency. A single-vendor brick is mentioned in domain 1, but no alternative is considered in domain 2. Consequence: the disappearance of the upstream component stops your operations without usable notice.
  • Absence of escrow, of release-on-trigger or of reversibility clause. Domain 5 describes an intention without a mechanism. Consequence: no contractual mechanism is triggered the day the provider closes.
  • Domain 7 empty or reduced to platitudes. The provider names no limit and assumes no precise commitment. Consequence: you do not know what it refuses to carry, and therefore what you must carry in its place.
  • Profile undated or frozen for more than eighteen months. The chain described is no longer the current chain. For the contexts documented by the dossier — see in particular family 1 — licence flips — a Profile not revised after a structuring event amounts to a misleading declaration.

How to act#

Reading a Profile is not enough — it must be tied back to the decision. Four gestures specific to the CIO make the reading operational.

First, integrate the Profile into the IS cartography: each strategic provider is tied to its Profile, dated, archived. The Profile becomes a documentary piece of the application file, on the same footing as the architecture sheet.

Next, schedule the migrations identified by the workarounds in domain 2. An unscheduled workaround plan is a plan that fades; a plan written into the IS master plan on a named horizon is a plan that survives team changes.

Then, require the annual update of the Profile in support contracts and attach the document to the continuity / disaster-recovery sheets of critical applications. The update becomes a contractual obligation, not a courtesy.

Finally, make renewals conditional on a complete Profile. A provider that refuses to complete its domain 5 or its domain 7 before renewal is telling you something: its Profile does not hold up to the reading made of it. The CIO can commit symmetrically on the user organisation side, for example through user-001-audit-dependencies, to make the approach reciprocal. The perimeter of the device itself is documented in the assumed limits.

Prepare your own declaration#

Your organisation is also, in another capacity, a provider. You offer information systems to your internal business lines — they depend on you as you depend on your external providers. The manifesto asks providers for a domain 7 that names their limits; a CIO can publish their own commitments declaration to make readable the chain they pilot, and tie it to the full philosophy of the device. The basket below proposes the commitments and domains relevant to this persona.

Preparing your declaration — angle DSI

The manifesto asks providers for a domain 7. You may publish it as well.

Suggested commitments

  • Conduire un audit interne de notre exposition aux dépendances technologiques single-vendor

    Examiner systématiquement vos technologies pour identifier celles dont la trajectoire dépend d'un seul éditeur.

    See record →
  • Documenter publiquement la juridiction de gouvernance des principaux composants de notre chaîne d'approvisionnement

    Publier sur votre site une documentation lisible des composants de votre chaîne d'approvisionnement avec leur juridiction.

    See record →
  • Exiger des Profils de souveraineté de toute la chaîne dans nos appels d'offres à enjeu

    Transformer la prise en compte du Profil en exigence formelle pour les appels d'offres et processus d'achat à enjeu.

    See record →

Relevant Profile domains

  • Engagements et limites assumés

    Déclarer honnêtement ce que vous garantissez et ce que vous ne pouvez pas garantir

    See record →
  • Hébergement et données

    Préciser où vivent réellement les données et qui peut y accéder

    See record →
  • Composants tiers stratégiques

    Lister les briques sans lesquelles votre solution ne fonctionne pas

    See record →

0 commitments, 0 domains in my declaration

Continue in the wizard →