Narrative intro
Public-sector cloud is shaped by sovereignty. The regulator's question is not 'is this secure?' but 'where does the data live, who can access it, and can you prove both?' This map walks the architectural and SKU choices that satisfy that scrutiny — Microsoft Cloud for Sovereignty as the architectural baseline, customer-managed HSM keys, Confidential Computing for the most sensitive workloads, and continuous compliance attestation as the ongoing discipline.