Home / Chroniques / Is the dependence of governments on digital giants a problem?
Scanning the crowd of people walking at the railway station. Sur
π Science and technology

Is the dependence of governments on digital giants a problem?

Christophe Gaie
Christophe Gaie
Head of the Engineering and Digital Innovation Division at the Prime Minister's Office
Jean LANGLOIS-BERTHELOT
Jean Langlois-Berthelot
Doctor of Applied Mathematics
Key takeaways
  • The breakdown of Windows servers due to Crowdstrike’s Falcon EDR revealed the risks of State dependence on private software.
  • Digital sovereignty requires the State to ensure its independence in terms of technological and digital resources.
  • The use of non-state digital solutions, although cost-effective, can compromise the security and independence of the state.
  • The outsourcing of digital services must be carefully managed to balance efficiency and sovereignty.
  • A DevSecOps approach and other measures such as active monitoring of systems would protect the State’s digital sovereignty.

The recent crit­ic­al fail­ure of Win­dows serv­ers, linked to Crowdstrike’s Fal­con EDR1, has high­lighted the risks asso­ci­ated with the State’s depend­ence on private soft­ware. Although the French Min­is­ter for the Armed Forces has sought to offer reas­sur­ance2, the fact remains that the use of com­mer­cial digit­al ser­vices with­in the State must be sub­ject to a bene­fit-risk ana­lys­is designed to ensure that the gain in effi­ciency out­weighs the con­ces­sions in terms of sovereignty.

What is digital sovereignty?

The sov­er­eignty of a State is its abil­ity to guar­an­tee its inde­pend­ence from oth­er States. It requires the abil­ity to have at its dis­pos­al the human, mater­i­al and tech­no­lo­gic­al resources and any oth­er com­pon­ent needed to pro­duce the nation’s vital goods and ser­vices. This capa­city is judged either at a sys­tem­ic level or at the level of each pub­lic policy. Sov­er­eignty cov­ers food, fin­ance, mil­it­ary, and now digit­al issues, which are com­mon to all these areas.

Digit­al sov­er­eignty con­cerns many aspects, the main ones being3,4:

  • Digit­al assets, since it is neces­sary to have basic equip­ment gen­er­ated without secur­ity risk (fibres, anten­nas, serv­ers, fire­walls, routers, etc.) to build a trus­ted inform­a­tion system.
  • Digit­al ser­vices, because it is essen­tial to be able to col­lect, pro­cess and return inform­a­tion securely to carry out the State’s sov­er­eign func­tions (digit­al iden­tity, crisis man­age­ment, col­lec­tion of taxes and social secur­ity con­tri­bu­tions, etc.).

Why use non-government digital solutions?

Using non-gov­ern­ment solu­tions means that solu­tions already developed else­where can be made avail­able more quickly, enabling the gov­ern­ment to focus its digit­al efforts on its core busi­ness. This is often done for reas­ons of effi­ciency and eco­nom­ies of scale, since a pro­pri­et­ary or open-source solu­tion is some­times used by thou­sands or mil­lions of oth­er organ­isa­tions. Examples include text or spread­sheet edit­ors (vari­ous Office suites), payroll or leave man­age­ment soft­ware (SAP, HR-Access, etc.)5 or e‑mail send­ing and receiv­ing soft­ware (Out­look, Thun­der­bird, etc.). This cross-func­tion­al soft­ware is tried and tested and ready to use. Cre­at­ing an intern­al solu­tion for the admin­is­tra­tion would be very costly and prob­ably unsuit­able for man­aging a com­mon digit­al requirement.

The acquis­i­tion of equip­ment via ser­vices also makes it pos­sible to meet needs that would require very sub­stan­tial invest­ment by the gov­ern­ment. And without being able to eas­ily ensure eco­nom­ic oppor­tun­it­ies. This is par­tic­u­larly true when it comes to pur­chas­ing com­puters, print­ers, stor­age bays or net­work equip­ment. These pur­chases offer a guar­an­tee of expert­ise and know-how in rel­at­ively stand­ard com­pon­ents, as well as the pos­sib­il­ity of using ded­ic­ated digit­al assist­ance. This approach offers excel­lent effi­ciency, provided that the hard­ware used is suf­fi­ciently stand­ard­ised to be integ­rated into the administration’s inform­a­tion sys­tem and can be sup­ple­men­ted by addi­tion­al ser­vices: applic­a­tions, super­vi­sion, intru­sion detec­tion, etc.

The use of open-source solu­tions can also offer a sig­ni­fic­ant capa­city for innov­a­tion and respons­ive­ness, as it enables tools and applic­a­tions to be integ­rated rap­idly at a mod­er­ate invest­ment cost. In addi­tion, this approach makes it pos­sible to attract digit­al pro­files keen to con­trib­ute to the open-source com­munity and to offer cit­izens real trans­par­ency about the tools used with­in the gov­ern­ment6.

What are the risks of using non-government digital solutions?

The digit­al solu­tions offered by com­mer­cial com­pan­ies com­ply with European and French reg­u­la­tions. But they may also com­ply with the reg­u­la­tions of oth­er coun­tries on mat­ters relat­ing to the pro­tec­tion of nation­al interests. To illus­trate this risk, we can cite the Pat­ri­ot Act, cre­ated after the 2001 ter­ror­ist attacks, which enables the FBI to force com­pan­ies to give it access to their per­son­al data­bases, even for inform­a­tion stored in Europe. Sim­il­arly, the Cloud Act allows the Amer­ic­an author­it­ies to access data stored by Amer­ic­an com­pan­ies, even if this data is stored in Europe, con­trary to the oblig­a­tions of the RGPD7.

Fur­ther­more, com­mer­cial or open-source solu­tions may have vul­ner­ab­il­it­ies; the cor­rec­tion of which may be delayed due to cost, lack of human resources or a vari­ety of oth­er reas­ons. These delays in main­tain­ing secur­ity con­di­tions are not neces­sar­ily known to the com­pany or are not imme­di­ately com­mu­nic­ated to cus­tom­ers. As a res­ult, these solu­tions, which have not been developed by the State, can cre­ate secur­ity vul­ner­ab­il­it­ies without the State ser­vices neces­sar­ily being aware of them. The flaw linked to the use of Moveit trans­fer soft­ware had a major impact on Colorado’s Medi­caid pro­gramme8.

In addi­tion, the increas­ing use of digit­al solu­tions developed by private com­pan­ies may increase the State’s depend­ence on private tech­no­lo­gies. This can give private com­pan­ies sig­ni­fic­ant power over how the state oper­ates and may lim­it its abil­ity to con­trol costs and ser­vices. The major change in pri­cing policy for VMWare solu­tions is an example of this9.

Finally, the pro­cess of integ­rat­ing non-gov­ern­ment solu­tions into gov­ern­ment inform­a­tion sys­tems requires par­tic­u­larly rig­or­ous man­age­ment of the inter­faces between the vari­ous com­pon­ents, wheth­er soft­ware and/or hard­ware. To this end, inter­op­er­ab­il­ity pro­to­cols must be pre­cisely defined and com­ply with the latest reg­u­la­tions and secur­ity stand­ards, to avoid poten­tial exploit­able vul­ner­ab­il­it­ies. A symp­to­mat­ic example is the use of REST­ful APIs for inter-ser­vice com­mu­nic­a­tions. This can enable seam­less integ­ra­tion and offers a lay­er of secur­ity via authen­tic­a­tion and encryp­tion pro­to­cols. The adop­tion of con­tain­er tech­no­lo­gies such as Kuber­netes or Dock­er should also be care­fully con­sidered. Con­tain­er­isa­tion enables more agile and secure man­age­ment of applic­a­tion deploy­ments10.

How can we achieve the best possible balance between sovereignty and efficiency?

For the State to func­tion as effect­ively as pos­sible, we believe it is import­ant to strike a bal­ance between sov­er­eignty and effi­ciency. We there­fore pro­pose sev­er­al non-exhaust­ive guidelines:

  1. Define the ser­vices that can be out­sourced and those that abso­lutely must be provided in-house. This approach con­cerns busi­ness applic­a­tions (tax cal­cu­la­tions for the DGFiP (Dir­ec­tion générale des Fin­ances pub­liques), intern­al secur­ity applic­a­tions for law enforce­ment agen­cies, etc.), as well as the neces­sary tech­nic­al ser­vices (office auto­ma­tion, inter­net brows­ing, oper­at­ing sys­tem, net­work oper­a­tion, etc.).
  1. Identi­fy the risks asso­ci­ated with out­sourcing and the meas­ures to be taken to mit­ig­ate them. The aim is to define the actions to be taken to main­tain con­trol of each out­sourced ser­vice with­in the State. To achieve this, it is advis­able to define the organ­isa­tion­al pro­ced­ures for out­sourcing: the play­ers involved, con­trac­tu­al com­mit­ments, veri­fic­a­tion pro­ced­ures, the abil­ity to ensure revers­ib­il­ity, etc. These actions are part of the pro­cess of integ­rat­ing secur­ity into pro­jects and val­id­at­ing them dur­ing the secur­ity approv­al pro­cess11.
  1. Pay par­tic­u­lar atten­tion to MCO/MCS pro­ced­ures. The aim of this task is to ensure that intern­al and extern­al solu­tions are updated reg­u­larly, with a view to cor­rect­ing mal­func­tions and secur­ity flaws. The quick­er patches are released, the quick­er applic­a­tions are pro­tec­ted against known flaws and mal­func­tions. This approach ensures that the solu­tions used remain state-of-the-art.
  1. Use a DevSecOps approach. At the heart of a neces­sar­ily integ­rated pro­cess, adopt­ing a DevSecOps approach is a means of rein­for­cing secur­ity in the early phases of soft­ware devel­op­ment. It is by integ­rat­ing auto­mated and robust secur­ity tests into the CI/CD (Con­tinu­ous Integration/ContinuousDeployment) pipelines that the main vul­ner­ab­il­it­ies can be detec­ted and cor­rec­ted. This is par­tic­u­larly effect­ive, as it means that a cor­rec­tion can be made before the code reaches the pro­duc­tion envir­on­ment. This approach can lead to sub­stan­tial dif­fer­ences for gov­ern­ment-crit­ic­al applic­a­tions. For these types of applic­a­tion, a secur­ity flaw can have dir­ect con­sequences for digit­al sov­er­eignty12.
  1. Raise aware­ness amongst all parties involved and set up a ded­ic­ated com­mit­tee. The aim of this action is to ensure that every mem­ber of the organ­isa­tion has the neces­sary know­ledge of how the applic­a­tion works and how to take into account the patches repor­ted by the CERTs13. In this way, the application’s pro­tec­tion will be bet­ter taken into account and it will be pos­sible to pri­or­it­ise the most sig­ni­fic­ant devel­op­ments for the State. 
  1. Rely on a mon­it­or­ing and intru­sion detec­tion sys­tem. SIEM (Secur­ity Inform­a­tion and Event Man­age­ment) is anoth­er tech­nic­al dimen­sion that is essen­tial when set­ting up robust sys­tems. SIEM solu­tions such as ELK Stack or Splunk are essen­tial for ana­lys­ing logs in real time, so as to effect­ively detect abnor­mal beha­viour and pat­terns, which may be the res­ult of inac­tion or a secur­ity breach. This integ­ra­tion of tools with auto­mated response sys­tems can reduce the time taken to react to a threat. This is a decis­ive aspect in lim­it­ing the poten­tial impact on the State’s crit­ic­al infra­struc­tures14.
1Matt O’Brien Ap Tech­no­logy. “How a faulty Crowd­Strike update crashed com­puters around the world.” ABC News, July 20, 2024. https://​abcnews​.go​.com/​B​u​s​i​n​e​s​s​/​w​i​r​e​S​t​o​r​y​/​c​r​o​w​d​s​t​r​i​k​e​-​f​a​i​l​u​r​e​-​h​i​g​h​l​i​g​h​t​s​-​f​r​a​g​i​l​i​t​y​-​g​l​o​b​a​l​l​y​-​c​o​n​n​e​c​t​e​d​-​t​e​c​h​n​o​l​o​g​y​-​1​1​2​1​23294
2Ber­theli­er, Anthony. “Panne Microsoft : Lecornu répond à Mélen­chon qui s’inquiète de l’impact du bug sur les armées françaises.” Le Huff­Post, July 19, 2024. https://​www​.huff​ing​ton​post​.fr/​p​o​l​i​t​i​q​u​e​/​a​r​t​i​c​l​e​/​p​a​n​n​e​-​m​i​c​r​o​s​o​f​t​-​l​e​c​o​r​n​u​-​r​e​p​o​n​d​-​a​-​m​e​l​e​n​c​h​o​n​-​q​u​i​-​s​-​i​n​q​u​i​e​t​e​-​d​e​-​l​-​i​m​p​a​c​t​-​d​u​-​b​u​g​-​s​u​r​-​l​e​s​-​a​r​m​e​e​s​-​f​r​a​n​c​a​i​s​e​s​_​2​3​7​1​8​4​.html
3Weber, A., Reith, S., Kasper, M., Kuhl­mann, D., Seifert, J. P., & Krauß, C. (2018). Sov­er­eignty in inform­a­tion tech­no­logy. Secur­ity, safety and fair mar­ket access by open­ness and con­trol of the sup­ply chain. Karls­ruhe: KIT-ITAS. https://www.fraunhofer.sg/content/dam/singapur/documents/Digital%20Sovereignty.pdf.
4Pohle, Julia and Thiel, Thor­sten, Digit­al sov­er­eignty (Decem­ber 17, 2020). Pohle, J. & Thiel, T. (2020). Digit­al sov­er­eignty. Inter­net Policy Review, 9(4). https://​doi​.org/​1​0​.​1​4​7​6​3​/​2​0​2​0​.​4​.1532, Avail­able at SSRN: https://​ssrn​.com/​a​b​s​t​r​a​c​t​=​4​0​81180
5Louis Ray­mond, Sylvestre Uwizeyemun­gu, and Fran­cois Ber­ger­on, Motiv­a­tions to imple­ment ERP in e‑government: an ana­lys­is from suc­cess stor­ies, Elec­tron­ic Gov­ern­ment, an Inter­na­tion­al Journ­al 2006 3:3, 225–240, https://​doi​.org/​1​0​.​1​5​0​4​/​E​G​.​2​0​0​6​.​0​09597
6Wijn­hoven, Fons, Michel Ehren­hard, and Johannes Kuhn. “Open gov­ern­ment object­ives and par­ti­cip­a­tion motiv­a­tions.” Gov­ern­ment Inform­a­tion Quarterly 32, no. 1 (Janu­ary 1, 2015): 30–42. https://​doi​.org/​1​0​.​1​0​1​6​/​j​.​g​i​q​.​2​0​1​4​.​1​0.002
7Rojszczak, Mar­cin. “CLOUD act agree­ments from an EU per­spect­ive.” Com­puter Law and Secur­ity Report/Computer Law & Secur­ity Report 38 (Septem­ber 1, 2020): 105442. https://​doi​.org/​1​0​.​1​0​1​6​/​j​.​c​l​s​r​.​2​0​2​0​.​1​05442
8Page, Carly August 14, 2023 “Tech­Crunch is part of the Yahoo fam­ily of brands,” August 14, 2023. https://​tech​crunch​.com/​2​0​2​3​/​0​8​/​1​4​/​m​i​l​l​i​o​n​s​-​a​m​e​r​i​c​a​n​s​-​h​e​a​l​t​h​-​d​a​t​a​-​m​o​v​e​i​t​-​h​a​c​k​e​r​s​-​c​l​o​p​-ibm/
9léchaux Reyn­ald, LeM­ondeIn­form­atique. 22 Mai 2024 “Face à l’intransigeance de Broad­com-VMware, les DSI craquent”, https://​www​.lem​ondein​form​atique​.fr/​a​c​t​u​a​l​i​t​e​s​/​l​i​r​e​-​f​a​c​e​-​a​-​l​-​i​n​t​r​a​n​s​i​g​e​a​n​c​e​-​d​e​-​b​r​o​a​d​c​o​m​-​v​m​w​a​r​e​-​l​e​s​-​d​s​i​-​c​r​a​q​u​e​n​t​-​9​3​7​8​7​.html
102020 cyber­se­cur­ity and pri­vacy annu­al report. NIST SPECIAL PUBLICATION, 2020, vol. 800, p. 214.
11July 18, 2022. “Inté­grer la sécur­ité dans les pro­jets | ANSSI,” https://​cyber​.gouv​.fr/​i​n​t​e​g​r​e​r​-​l​a​-​s​e​c​u​r​i​t​e​-​d​a​n​s​-​l​e​s​-​p​r​ojets
12Open Web Applic­a­tion Secur­ity Project’s Top Ten 2021, The OWASP Found­a­tion, 2022
13July 18, 2022. “Struc­turer ses mesur­es de sécur­ité | ANSSI,” https://​cyber​.gouv​.fr/​s​t​r​u​c​t​u​r​e​r​-​s​e​s​-​m​e​s​u​r​e​s​-​d​e​-​s​e​c​urite
14Novem­ber 15,2021. “The Top 8 Secur­ity and Risk Trends We’re Watch­ing”, https://​www​.gart​ner​.com/​s​m​a​r​t​e​r​w​i​t​h​g​a​r​t​n​e​r​/​g​a​r​t​n​e​r​-​t​o​p​-​s​e​c​u​r​i​t​y​-​a​n​d​-​r​i​s​k​-​t​r​e​n​d​s​-​f​o​r​-2021

Support accurate information rooted in the scientific method.

Donate