July 10, 2024 By Jonathan Reed 4 min read

The landscape of international cyber policy continues to evolve rapidly, reflecting the dynamic nature of technology and global geopolitics. Central to this evolution are two competing concepts: digital solidarity and digital sovereignty.

The U.S. Department of State, through its newly released International Cyberspace and Digital Policy Strategy, has articulated a clear preference for digital solidarity, positioning it as a counterpoint to the protectionist approach of digital sovereignty.

What are the main differences between these two concepts, and why does it matter? Let’s find out.

What is digital solidarity?

Digital solidarity emphasizes collaboration and mutual support among nations to reach shared technological and economic goals. This approach, unveiled on May 6, 2024, during the RSA Conference, highlights the U.S. commitment to building an open, resilient and secure digital ecosystem. Digital solidarity involves working closely with international partners to align regulations, share best practices and respond jointly to cyberattacks.

Key components of digital solidarity include:

  1. Promote an inclusive digital ecosystem: By fostering a competitive market for digital technologies, the U.S. aims to spur innovation and reduce reliance on authoritarian regimes. Key to this effort is enabling emerging economies to have access to robust and secure digital infrastructure. This involves deploying secure telecommunications infrastructure, expanding cloud service access and enhancing the security of undersea cables.

  2. Align governance approaches: This entails developing and promoting common standards and policies for data governance that respect human rights and facilitate the free flow of data across borders. Initiatives like the Global Cross-Border Privacy Rules (CBPR) Forum aim to harmonize data privacy frameworks. The goal is to ensure data security while supporting international trade and economic development.

  3. Advance responsible state behavior: Establishing and enforcing norms for state conduct in cyberspace is crucial for global security. This includes promoting cooperation, information sharing and accountability among nations. Cyber norms agreements aim to create a stable global cyberspace where states adhere to agreed principles.

  4. Strengthen cyber capacity: Enhancing the technical and operational capabilities of partner nations will bolster their cyber defenses. To this end, the U.S. provides technical assistance, training and resources through initiatives like the Cyberspace, Digital Connectivity and Related Technologies Fund. The goal is to ensure countries have the knowledge and tools to protect their digital infrastructure.

The rise of digital sovereignty

In contrast, digital sovereignty is characterized by a nation’s desire to control its digital infrastructure and data flows through more protectionist measures. This approach can involve restricting foreign access to domestic markets, mandating data localization and favoring local companies over international competitors.

Digital sovereignty proponents argue that by having tighter control over infrastructure and data, nations can better protect against malicious activities. They also believe that fostering local tech industries and reducing dependence on foreign technology helps them to ensure economic stability and growth.

The U.S. and other critics of digital sovereignty warn that these policies can lead to fragmented global internet governance, thereby increasing cybersecurity risks and hampering innovation. By isolating digital ecosystems and erecting barriers to international collaboration, digital sovereignty can undermine the collective efforts needed to address global cyber threats and advance technological progress.

Impacts on national cybersecurity

The choice between digital solidarity and digital sovereignty has significant implications for national cybersecurity. Digital solidarity fosters a cooperative international environment where nations can share threat intelligence, coordinate cyber incident response and develop common defenses against shared threats. This collaborative approach enhances the overall security posture of participating countries and makes it harder for malicious actors to exploit gaps in national defenses.

Conversely, digital sovereignty can lead to siloed security practices and a lack of coordination among nations. By prioritizing national control over international cooperation, countries may find themselves isolated in their efforts to combat sophisticated cyber threats. This isolation can make it easier for adversaries to launch attacks with impunity. A piecemeal global response reduces the effectiveness of collective defense measures.

Meanwhile, state-sponsored actors could benefit from the legitimacy provided by state control over digital infrastructure. Intruders could exploit state-sanctioned channels or use state-owned enterprises as fronts for their activities. This makes it harder to distinguish between legitimate state actions and criminal activities.

Moving forward with digital solidarity

The U.S. strategy underscores the importance of digital solidarity in shaping a secure and prosperous digital future. By working with allies and partners, the U.S. aims to build a robust and inclusive digital ecosystem that supports innovation, protects human rights and enhances global security. This approach involves significant diplomatic efforts as well as investments in cybersecurity infrastructure and international governance agreements.

Key initiatives under this strategy include:

  1. Developing AI governance frameworks: Establishing international standards for the ethical use of AI (prevent misuse / promote benefits) is key to digital solidarity. This includes working with partners through the G7 and other forums to create guidelines for the development of AI technologies.

  2. Enhancing supply chain security: This entails collaborating with partners to diversify and secure supply chains for critical technologies like semiconductors and cloud services. The U.S. is investing in domestic production and working with allies to create resilient and secure supply chains that reduce dependency on authoritarian regimes.

  3. Promoting cyber norms: This includes advocating for global norms that define acceptable state behavior in cyberspace and hold violators accountable. The hope is that the UN and other international bodies will develop agreements on cyber norms and assist member states in enforcing these norms.

Ongoing tensions

The debate between digital solidarity and digital sovereignty reflects broader tensions in international relations and governance philosophies. While digital sovereignty offers a sense of control and protection, it risks isolating nations and undermining collective security efforts.

Digital solidarity, on the other hand, promotes a cooperative and inclusive approach to cyber diplomacy. As nations navigate this complex landscape, the principles of digital solidarity outlined by the U.S. strategy provide a compelling framework for addressing the challenges of the digital age.

More from Risk Management

Why do software vendors have such deep access into customer systems?

4 min read - To the naked eye, organizations are independent entities trying to make their individual mark on the world. But that was never the reality. Companies rely on other businesses to stay up and running. A grocery store needs its food suppliers; a tech company relies on the business making semiconductors and hardware. No one can go it alone.Today, the software supply chain interconnects companies across a wide range of industries. Software applications and operating systems depend on segments of the software…

How CTEM is providing better cybersecurity resilience for organizations

4 min read - Organizations today continuously face a number of fast-moving cyber threats that regularly challenge the effectiveness of their cybersecurity defenses. However, to keep pace, businesses need a proactive and adaptive approach to their security planning and execution.Cyber threat exposure management (CTEM) is an effective way to achieve this goal. It provides organizations with a reliable framework for identifying, assessing and mitigating new cyber risks as they materialize.The importance of developing cybersecurity resilienceRegardless of the industry, all organizations are subject to certain…

Is the water safe? The state of critical infrastructure cybersecurity

4 min read - On September 25, CISA issued a stark reminder that critical infrastructure remains a primary target for cyberattacks. Vulnerable systems in industrial sectors, including water utilities, continue to be exploited due to poor cyber hygiene practices. Using unsophisticated methods like brute-force attacks and leveraging default passwords, threat actors have repeatedly managed to compromise operational technology (OT) and industrial control systems (ICS).Attacks on the industrial sector have been particularly costly. The 2024 IBM Cost of a Data Breach report found the average total…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today