A financial services company encrypts every packet leaving its European data center. It meets every checkbox on the security audit. Then a routine compliance review reveals that cloud-to-cloud traffic between its Frankfurt and Dublin environments was routed through infrastructure in a region the company never approved. The data was encrypted the entire time. It was also non-compliant the entire time.
This is the scenario most enterprises aren't preparing for. Not a breach. Not a failed encryption handshake. A path problem.
When enterprises connect workloads across AWS, Azure, Google Cloud, or GPU cloud providers, the assumption is usually that traffic stays where it should. But cloud-to-cloud routing doesn't work that way. Traffic follows the paths that cloud providers and carrier networks negotiate between themselves, based on cost, capacity, and peering relationships. Not based on your compliance policy.
That means a workload running in one approved region can send data through transit infrastructure in a completely different geography before it reaches another approved region. The enterprise never chose that path. Often, the enterprise doesn't even know it happened.
For organizations subject to GDPR, data residency requirements, or sector-specific sovereignty mandates, this isn't a minor gap. It's the kind of exposure that turns a routine audit into a remediation project. And the frustrating part is that the security controls were working. Encryption was on. Access was restricted. The failure was in the route, not the payload.
The same issue shows up in B2B and partner environments, often with less visibility. Traditional partner connectivity relies on VPN tunnels, dedicated links, or firewall rules that took weeks to configure and are rarely revisited once they're running. The connection works, traffic flows, and the assumption is that the path is fine.
But "fine" is doing a lot of work in that sentence. When a partner sends data into your environment, do you know which networks it crossed? When you share data with a supplier, can you verify it stayed within the regions both parties agreed to? If a regulator asks for evidence that partner data exchange followed policy, can you produce it?
Most enterprises can't. The connectivity was built for function, not for governance. And as partner ecosystems grow and data sharing becomes more frequent, that gap between "connected" and "controlled" gets wider.
Solving this requires a different starting point. Instead of building connectivity first and layering compliance on afterward, the path itself has to be a policy decision.
For multi-cloud and cross-border scenarios, that means geographic routing control: the ability to approve or deny specific regions by application and tenant, keep traffic on verified paths, and prevent data from transiting through jurisdictions that violate sovereignty requirements. Graphiant's Data Sovereignty capability is built around exactly this. Traffic stays within approved regions, encryption keys stay at the edge, and the stateless core means no data is stored or cached in transit, reducing exposure even to foreign legal demands.
For partner and B2B scenarios, it means rethinking how external connectivity works. Rather than extending broad network access through legacy VPNs, organizations can establish segmented exchange relationships where each partner gets only the connectivity required for their specific purpose. Graphiant's Zero Trust Data Exchange model uses a publish-and-subscribe approach: define who can connect, set the policies, onboard partners in minutes, and maintain continuous visibility into how data moves between organizations.
In both cases, Graphiant Data Assurance provides the verification layer. GAPS (Graphiant Assurance Posture Scores) profile risk continuously rather than at a point in time, and audit-ready evidence is generated automatically so compliance teams aren't reconstructing proof after the fact.
Encryption will keep your data unreadable. It won't keep it out of the wrong country. It won't prove to a regulator that partner traffic followed the agreed path. And it won't tell you whether a cloud-to-cloud workload took a detour through infrastructure you'd never approve if you knew about it.
The question worth asking isn't just "did the data arrive safely?" It's "can I prove it took the right route to get there?"
That's the difference between being secure and being assured.
Resources