USE CASES · REGULATED WORKLOADSEIGHT SCENARIOS

Where cloudtaser pays for itself.

Every scenario below maps to specific EU regulations. Each shows the workload, the legal surface, and the concrete mechanism by which cloudtaser removes the provider from the trust chain.

01 · Financial services

Regulated workloads on managed Kubernetes, without CLOUD Act exposure.

REGULATORY LANDSCAPE

Overlapping rules on cross-border access

  • PSD2 - strong customer authentication and secure payment credentials, protected from unauthorised access including the infrastructure provider.
  • DORA - in November 2025, AWS, Google, and Azure were designated Critical ICT Third-Party Providers. Articles 28 and 30 require contractual data-protection provisions - but contracts alone fail under the CLOUD Act.
  • GDPR Articles 44–49 - require adequate protection for cross-border transfers; the EDPB recommends client-side encryption where the provider does not hold keys.
  • MiFID II / MiFIR - transaction reporting and record-keeping require protection plus auditability.
SCENARIO · EUROPEAN BANK ON AWS EKS

Payments API in eu-west-1

A European bank runs its payments API on AWS EKS in eu-west-1. Under DORA, AWS is now classified as a Critical ICT Third-Party Provider - the bank must demonstrate third-party risk management. Under the CLOUD Act, AWS can be compelled to hand over database credentials, transaction records, and customer payment data, regardless of the data-centre location.

HOW cloudtaser HELPS

The bank keeps the keys. AWS gets ciphertext.

  • Database passwords and API keys are fetched from an EU-hosted OpenBao instance in Frankfurt. The wrapper's secret store delivers them into process memory - never into etcd, K8s Secrets, or disk. The wrapped application's runtime (JVM heap dumps, kernel coredumps) is governed by host policy.
  • The S3 proxy encrypts transaction logs with per-object AES-256-GCM keys before they reach S3. AWS sees only ciphertext.
  • eBPF monitoring provides the runtime incident detection DORA requires - 7 Prometheus metrics feed directly into existing SIEM/alerting pipelines.
  • Secret store audit logs create a tamper-proof record of every secret access, satisfying DORA's third-party risk assessment requirements.
  • Portable secret store + standard K8s enable the DORA-mandated exit strategy - migrate between providers without re-architecting secret management.

Full DORA compliance mapping

02 · Healthcare

Patient records on cloud, under EU jurisdiction.

REGULATORY LANDSCAPE

Some of the strictest sovereignty rules in the EU

  • EHDS · Regulation EU 2025/327, March 2025. Mandatory primary-use obligations from March 2029. Member states can require EU-only storage and processing.
  • GDPR Articles 9 + 44–49 - health data is a "special category"; cross-border transfers require supplementary technical measures.
  • National medical confidentiality laws - Dutch WGBO, German Patientenrechtegesetz, French Code de la santé publique.
  • NIS2 - healthcare providers are essential entities with 24-hour incident notification.
SCENARIO · DUTCH HOSPITAL CHAIN ON AZURE AKS

Patient management in Amsterdam

A Dutch hospital chain runs patient management on Azure AKS. Patient records, lab results, and prescriptions are stored in Azure-managed databases. GDPR Articles 44–49 require adequate protection for cross-border transfers. The CLOUD Act means Microsoft could be compelled to disclose patient data to US authorities, violating both GDPR and the Dutch WGBO medical confidentiality law.

HOW cloudtaser HELPS

Medical records as ciphertext. Keys in Amsterdam.

  • Database credentials for the patient record system live in an EU secret store in Amsterdam. Microsoft cannot access them even under court order.
  • Medical data in Azure Blob Storage is encrypted client-side via the S3 proxy. Patient records are inaccessible to Microsoft.
  • The wrapper injects secrets without modifying existing containers - critical for certified medical software that cannot be modified.
  • eBPF agent monitoring satisfies NIS2 incident detection with real-time Prometheus metrics.
  • EHDS-ready - when member states invoke the EU-only processing requirement, cloudtaser already ensures no plaintext leaves EU control.

EHDS compliance mapping

03 · Public sector

US cloud tech with EU-only key management.

REGULATORY LANDSCAPE

Scrutiny rising across every EU jurisdiction

  • BSI C5 (Germany) - required for German public-sector cloud procurement; demands demonstrated data sovereignty and EU-controlled key management.
  • SecNumCloud (France) - ANSSI qualification that demands immunity from non-EU laws.
  • EDPS ruling, March 2024 - the European Commission's own Microsoft 365 use was found to violate data-protection law.
  • Dutch Parliament, March 2025 - motions requiring reduced US-cloud dependence and European preferential treatment in procurement.
  • EC Cloud Sovereignty Framework, October 2025 - €180M tender explicitly includes key management under EU control as a sovereignty objective.
SCENARIO · GERMAN FEDERAL AGENCY ON GCP GKE

Citizen services on managed Kubernetes

A German federal agency runs citizen services on GCP GKE. BSI C5 certification requires demonstrated data sovereignty. The EDPS has already ruled the European Commission's own Microsoft 365 use illegal due to insufficient data protection. The agency needs best-in-class cloud technology without the legal exposure.

HOW cloudtaser HELPS

GCP keeps ciphertext. BSI keeps the keys.

  • All secrets and encryption keys are stored in BSI-compliant EU infrastructure. GCP stores only ciphertext.
  • Effective supplementary technical measures the EDPB recommends - satisfying both GDPR and C5 requirements simultaneously.
  • SecNumCloud-compatible - the technical layer makes US-hosted infrastructure functionally immune to CLOUD Act access.
  • Audit trail - every secret access is logged in the EU secret store, giving government auditors tamper-proof evidence.
  • No vendor lock-in - portable secret store plus standard Kubernetes means migration if sovereignty requirements change.

EUCS compliance mapping

04 · EU SaaS providers

Win procurement with a cryptographic proof, not a contract.

THE BUSINESS CHALLENGE

Enterprise buyers increasingly require technical proof

EU SaaS companies face a structural tension: they need US cloud infrastructure for global scale, but their EU enterprise customers increasingly demand proof that data is inaccessible to US authorities. Large procurement contracts now routinely include data-sovereignty clauses. Losing a deal because you cannot demonstrate sovereignty controls is a real revenue risk.

  • EU Data Act (Chapter VII) - providers must take reasonable technical measures to prevent unlawful third-country government access to non-personal data. Effective since September 2025.
  • GDPR cross-border transfer rules - SaaS providers processing EU customer data on US infrastructure need supplementary technical measures.
  • Customer procurement requirements - financial services, healthcare, and government increasingly require contractual sovereignty guarantees backed by technical controls.
SCENARIO · SWEDISH SAAS COMPANY ON AWS

Enterprise customers across the EU

A Swedish SaaS company serves enterprise customers across the EU. Large customers require data-sovereignty guarantees in their procurement contracts. The provider runs on AWS to meet global scale requirements, but EU customers increasingly demand proof that their data is inaccessible to US authorities.

HOW cloudtaser HELPS

Win the RFP with cryptographic guarantees.

  • Per-tenant secret isolation - each customer's secrets are isolated in the EU secret store with separate policies. No cross-tenant key access.
  • Per-tenant object encryption - customer data in S3 is encrypted with tenant-specific keys via the S3 proxy. Each customer's data is cryptographically isolated.
  • Demonstrable sovereignty - prove to EU enterprise buyers that their data is cryptographically protected from US government access.
  • EU Data Act compliance - client-side encryption is the "reasonable technical measure" Chapter VII requires.
  • Competitive advantage - win enterprise deals where competitors without sovereignty controls cannot.

GDPR compliance mapping

05 · ArgoCD & GitOps

Sealed Secrets, ESO, Vault Agent - all write to etcd. Ours doesn't.

THE GITOPS SECRET PROBLEM

Every existing approach leaks plaintext somewhere

GitOps workflows store desired state in Git and reconcile it to the cluster. This works well for manifests, but secrets create a conflict: you cannot store plaintext secrets in Git, and every workaround introduces complexity or risk.

  • Sealed Secrets / SOPS - encrypt in Git, decrypt into K8s Secrets at sync time. The decrypted secret still lands in etcd as base64 - readable by anyone with cluster access.
  • External Secrets Operator - syncs from an external store into K8s Secrets. The secret materialises in etcd; if the store is AWS Secrets Manager, the CLOUD Act still applies.
  • Vault Agent Injector - per-pod sidecar. Avoids etcd but adds per-pod resource overhead and per-deployment configuration.
  • ArgoCD Vault Plugin - renders placeholders at sync time. Still writes secrets to K8s Secrets in etcd after rendering.

Every GitOps secret solution either stores decrypted secrets in etcd, or requires per-pod sidecars with significant resource overhead.

HOW cloudtaser INTEGRATES WITH ARGOCD

Annotations in Git. Secrets in the EU secret store. Nothing in etcd.

Your ArgoCD Application manifests contain only cloudtaser annotations - role, secret paths, and env mapping. No encrypted blobs, no sealed secrets, no placeholder tokens, no vault addresses. The operator routes secret fetches through the P2P beacon broker, so pods need no per-workload vault config.

apiVersion: apps/v1
kind: Deployment
metadata:
  name: payments-api
spec:
  template:
    metadata:
      annotations:
        cloudtaser.io/inject: "true"
        cloudtaser.io/vault-role: "payments-api"
        cloudtaser.io/secret-paths: "secret/data/payments/credentials"
        cloudtaser.io/env-map: "password=DB_PASSWORD,api_key=STRIPE_KEY"
  • ArgoCD syncs normally - the mutating webhook intercepts pod creation, detects the annotations, and wraps the entrypoint. No plugins, no CRDs, no sync hooks.
  • Secrets flow from EU store to process memory - kubectl get secrets shows nothing cloudtaser-related.
ApproachSecrets in GitSecrets in etcdSidecar per podEU key sovereignty
Sealed SecretsEncrypted blobsYes, after decryptNoCluster-local key
External Secrets OperatorNoYes, synced from storeNoDepends on store
Vault Agent InjectorNoNoYesIf store is EU
ArgoCD Vault PluginPlaceholdersYes, after renderNoDepends on store
cloudtaserAnnotations onlyNoNo - process wrapperEU-hosted secret store
WORKS WITH ANY GITOPS TOOL

Admission webhooks don't care what created the pod

cloudtaser operates at the Kubernetes admission webhook level - it intercepts pod creation regardless of what created the pod. Works identically with:

  • ArgoCD - Application and ApplicationSet resources.
  • Flux CD - Kustomization and HelmRelease resources.
  • Helm - direct helm install or GitOps-managed HelmRelease.
  • kubectl apply - manual or CI/CD pipeline deployments.
  • Crossplane / Terraform - infrastructure-as-code managed pods.
06 · S3 Proxy

SSE is not client-side. Ours is.

THE PROBLEM WITH SERVER-SIDE ENCRYPTION

"Encryption at rest" means the disk - not the provider.

AWS SSE-S3, SSE-KMS, GCS CMEK, and Azure CMK all encrypt data at rest, but the provider holds the keys or has access to them during encryption/decryption operations. "Encryption at rest" means the disk is encrypted, not that the provider cannot read your data. Under a court order or internal access, they can - and will.

HOW THE S3 PROXY WORKS

Envelope encryption with transient DEKs

The proxy sits between your application and the storage endpoint. Envelope encryption: each object gets a unique data encryption key (DEK), the DEK encrypts the object with AES-256-GCM, and the DEK itself is wrapped via the OpenBao Transit secret engine using a transient key. The plaintext DEK never persists - it exists only in memory during the encryption operation.

Your application connects to the proxy instead of the provider endpoint (just change the S3 URL). The proxy handles encryption on upload and decryption on download transparently. Works with any S3 SDK - AWS CLI, boto3, MinIO client, any application that speaks S3 protocol.

STANDALONE BENEFITS

Useful even without the EU sovereignty angle

  • True client-side encryption - data is encrypted before it leaves your cluster.
  • Per-object unique keys - compromising one DEK does not compromise other objects.
  • Transient key wrapping - plaintext DEKs never touch disk or persistent storage.
  • Zero application changes - swap the S3 endpoint URL, everything else stays the same.
  • Multi-backend - AWS S3, GCS (S3-compatible mode), MinIO, Ceph, any S3 API.
  • Supports multipart uploads and range reads.
  • Audit trail - every encryption/decryption goes through the secret store.

How the encryption works

07 · AI & ML pipelines

Training pipelines are just K8s pods.

THE REGULATORY DRIVER

EU AI Act GPAI obligations

The EU AI Act's GPAI obligations took effect in August 2025. Model providers must maintain documentation about training data, comply with EU copyright law, and share information with regulators. Training large models on regulated data (patient records, financial transactions, personal data) requires protecting the entire pipeline's secrets - dataset access credentials, model weights storage keys, API keys.

HOW cloudtaser HELPS

Treat the training cluster like any other K8s cluster.

  • ML training pipelines on Kubeflow, Argo Workflows, or Ray clusters are just K8s pods. The wrapper injects credentials from the EU secret store without application changes.
  • eBPF agent monitors for credential exfiltration - critical when running untrusted model code.
  • S3 proxy encrypts training datasets and model artifacts at rest with per-object keys.
  • Automotive AI - NIS2 classifies connected vehicle infrastructure as critical. Backend services handling telemetry, OTA update keys, and fleet credentials have the same sovereignty requirements.
08 · OpenClaw

Malicious skills can't read what isn't on disk.

OpenClaw is an open-source personal AI assistant that connects to 20+ messaging platforms, executes shell commands, browses the web, and manages credentials for 50+ services. Its skills ecosystem lets anyone publish extensions - and that is where the problems start.

THE THREAT LANDSCAPE

1,000+ malicious skills, $1.2M+ stolen, 8 critical CVEs

OpenClaw's ClawHub skill marketplace has seen over 1,000 malicious skills uploaded, leading to $1.2M+ in cryptocurrency stolen via the AMOS stealer campaign. Skills execute with full agent privileges - shell access, filesystem, network, keychains - with no sandboxing. Kaspersky identified 512 vulnerabilities, 8 critical. Multiple CVEs have been published including a CVSS 8.8 one-click RCE.

The core problem: OpenClaw stores API tokens, chat history, and persistent memory either on disk or in cloud storage. When deployed to cloud infrastructure - which many users do for always-on availability - all of this becomes accessible to the cloud provider and to any malicious skill that can read files or environment variables.

Attack vectorWithout cloudtaserWith cloudtaser
API keys on disk / env filesTrivial to steal - cat .envIn process memory only - never on disk
/proc/environ readsUndetected - all env vars exposedeBPF detects in real time; synchronous block on kernels with CONFIG_BPF_KPROBE_OVERRIDE=y
Chat history / memory storagePlaintext in object storageAES-256-GCM ciphertext via S3 proxy
Credential exfiltration to C2Undetected curl to attacker servereBPF detects secret patterns in network buffers
Cloud provider accessProvider can read everythingProvider sees only ciphertext
Skill scanning local files for secretsFull filesystem access - SSH keys, wallets, configsSecrets not on filesystem - memory only
Court order / CLOUD ActFull access to all stored dataCiphertext and no keys to decrypt
cloudtaser AS AN OPENCLAW SKILL

Natural-language interface to secret management

  • "Scan my cluster for exposed secrets" - runs the cloudtaser CLI to discover K8s Secrets in pod specs.
  • "Show me which pods are cloudtaser-protected" - queries for cloudtaser.io/inject annotations.
  • "Deploy cloudtaser to my cluster" - walks through Helm installation, secret-store setup, Kubernetes auth.
  • "Check eBPF alerts" - surfaces recent secret-access violations from the eBPF agent logs.
WHAT cloudtaser DOES NOT FIX

Defence-in-depth, not a fix for OpenClaw's trust model

  • Application-level token sharing - if OpenClaw passes a token to a skill through its internal API, cloudtaser cannot intercept that handoff.
  • Prompt injection - a skill that tricks OpenClaw into running destructive commands is an application trust problem.
  • Missing skill vetting - ClawHub needs signing, provenance tracking, and sandboxing. cloudtaser reduces blast radius but does not replace supply-chain security.

See it running on your workload.

Interactive demo on real Kubernetes infrastructure. Same stack that protects payments APIs and patient records.