National Partner Clouds
Azure infrastructure operated by trusted national partners, providing sovereign cloud services with local data governance, operations, and support.
Table of Contents
- What are National Partner Clouds?
 - Why National Partner Clouds Exist
 - Major National Partner Clouds Overview
 - Major National Partner Clouds
 - Key Features of National Partner Clouds
 - Customer Scenarios
 - Migration and Onboarding Process
 - Sales Talking Points
 - Competitive Differentiation
 - Common Challenges and Solutions
 - Next Steps and Learning Resources
 
What are National Partner Clouds?
National Partner Clouds are Azure cloud environments operated by trusted in-country partners rather than directly by Microsoft. These clouds provide the same Azure services and capabilities while meeting specific national sovereignty, security, and compliance requirements that mandate local operation and control.
Core Concept
National Partner Clouds address scenarios where:
- National regulations require local cloud operators (e.g., government-only clouds)
 - Data must be under local legal jurisdiction with no foreign government access
 - Operations and support must be provided by local entities
 - Compliance certifications must be issued by national authorities
 - Critical national infrastructure requires sovereign cloud capabilities
 
Key Principle: “Azure services with national sovereignty through trusted local partners”
Why National Partner Clouds Exist
Regulatory and Legal Requirements
Many countries and sectors have regulations that require:
- Local Data Governance: Data subject only to national laws
 - Local Operations: Cloud infrastructure operated by domestic entities
 - Legal Jurisdiction: Services under national court jurisdiction, not foreign
 - Government Access Controls: Protection from foreign government data access laws
 - National Security: Critical infrastructure under national control
 
Example Regulations:
- United States: FedRAMP (federal government), ITAR (defense), CJIS (criminal justice)
 - China: Cybersecurity Law requiring local data storage and local operators
 - European Union: GDPR and various national data protection laws
 - Russia: Federal Law 242 requiring local data processing
 
Differentiation from Standard Azure
| Aspect | Standard Azure | National Partner Clouds | 
|---|---|---|
| Operated By | Microsoft Corporation | National partner (e.g., 21Vianet, government contractors) | 
| Legal Jurisdiction | Multiple jurisdictions | Single national jurisdiction | 
| Data Access | Microsoft personnel (with controls) | Partner personnel only (national) | 
| Compliance | Global certifications | National-specific certifications | 
| Network Isolation | Shared global network | Physically separated network | 
| Support | Microsoft global support | Partner local support | 
| Updates | Microsoft-managed | Partner-managed schedule | 
| Pricing | Microsoft pricing | Partner pricing | 
Major National Partner Clouds Overview
Major National Partner Clouds
1. Azure Government (United States)
Operator: Microsoft (with government-cleared personnel)
Target Customers: US federal, state, local, and tribal governments, and their partners
Key Characteristics:
Physical and Logical Isolation:
- Physically separate data centers from commercial Azure
 - Dedicated network infrastructure
 - Isolated from commercial Azure tenants
 - Air-gapped from public internet for Secret regions
 
Government Compliance:
- FedRAMP High: Authorized for federal civilian agencies
 - DoD Impact Level 2-5: Department of Defense workloads
 - DoD Impact Level 6: Classified Secret workloads (Azure Government Secret)
 - CJIS: Criminal Justice Information Services
 - IRS 1075: Tax information
 - ITAR: Export-controlled defense data
 
Personnel:
- All support personnel are US citizens
 - Background checks and clearances as required
 - Screened and vetted by US government
 
Regions:
- US Gov Virginia (primary)
 - US Gov Texas (secondary)
 - US Gov Arizona (tertiary)
 - US DoD East (DoD-specific)
 - US DoD Central (DoD-specific)
 - Azure Government Secret regions (classified workloads)
 
Use Cases:
- Federal civilian agencies (HHS, DoJ, Treasury, etc.)
 - Department of Defense and military services
 - Intelligence community (IC)
 - State and local government
 - Defense contractors (ITAR compliance)
 - Criminal justice agencies (CJIS)
 
Official Documentation: Azure Government
2. Azure China (21Vianet Operated)
Operator: 21Vianet (Beijing Century Interconnect Data Center Co., Ltd.)
Target Customers: Organizations operating in China requiring local data residency
Key Characteristics:
Local Operation:
- Fully operated and managed by 21Vianet (Chinese company)
 - Microsoft provides technology and support to 21Vianet
 - 21Vianet provides all customer support and billing
 - Data subject to Chinese law only
 
Regulatory Compliance:
- China Cybersecurity Law compliance
 - Multi-Level Protection Scheme (MLPS)
 - Trusted Cloud Service Certification (TCSC)
 - ISO 27001, ISO 27017, ISO 27018, ISO 20000, ISO 9001
 
Network Isolation:
- Completely separate from global Azure network
 - No direct connectivity to global Azure
 - Separate domain: .cn domains vs. .com for global Azure
 - Independent identity systems (Azure AD China vs. global Azure AD)
 
Service Availability:
- Most Azure services available (some lag behind global Azure)
 - Services adapted for Chinese market
 - Local language support and documentation
 - Pricing in Chinese Yuan (CNY)
 
Regions:
- China North (Beijing) - Operated by 21Vianet
 - China North 2 (Beijing) - Operated by 21Vianet
 - China East (Shanghai) - Operated by 21Vianet
 - China East 2 (Shanghai) - Operated by 21Vianet
 
Use Cases:
- Multinational companies with Chinese operations
 - Chinese domestic companies
 - Organizations subject to Chinese data localization laws
 - Mobile apps and services targeting Chinese market
 - Manufacturing and IoT in China
 
Important Notes:
- Separate Azure subscription required (cannot use global Azure subscription)
 - Different account and billing system (Azure China vs. global Azure)
 - Migration between Azure China and global Azure requires data transfer
 
Official Documentation: Azure China operated by 21Vianet
3. Azure Germany (Discontinued - Lessons Learned)
Status: Service discontinued in October 2021
Historical Operator: T-Systems International (Deutsche Telekom subsidiary)
Why It Existed:
- Designed to meet German data sovereignty requirements
 - Data trustee model: T-Systems controlled access to customer data
 - Microsoft had no access to customer data without T-Systems approval
 - Addressed concerns about US CLOUD Act and foreign government access
 
Why It Was Discontinued:
- Complexity: Data trustee model created operational complexity
 - Service Lag: New Azure services delayed due to trustee approval process
 - Better Alternatives: Microsoft’s EU Data Boundary provided similar guarantees with better service portfolio
 - Customer Preference: Customers preferred full Azure service portfolio with residency guarantees
 
Lessons Learned:
- Overly Restrictive Models Limit Innovation: Data trustee model slowed down service updates
 - Customer Preference for Full Services: Customers wanted all Azure services, not subset
 - EU Data Boundary More Effective: Policy-driven approach provides sovereignty without service limitations
 - Migration Path Important: Microsoft provided migration path to regular Azure (Germany regions)
 
Replacement Solution:
- Microsoft Azure regions in Germany (Germany West Central, Germany North)
 - EU Data Boundary commitment
 - Microsoft Cloud for Sovereignty
 - Same sovereignty guarantees without service limitations
 
4. Other Sovereign Cloud Initiatives
Microsoft continues to expand sovereign cloud capabilities globally:
Announced or In Development:
Australia:
- Azure Australia regions with government certifications
 - Protected-level certification for government workloads
 - Integration with Australian government identity systems
 
Japan:
- Azure Japan regions with local compliance
 - Support for Japanese government regulations
 - Integration with GovCloud Japan initiatives
 
Israel:
- Azure Israel regions planned
 - Support for Israeli government and defense requirements
 
Note: Many countries’ sovereignty needs are now addressed through Microsoft Cloud for Sovereignty (Sovereign Public Cloud model) rather than dedicated partner clouds. This provides better service portfolio and faster innovation while still meeting sovereignty requirements.
Key Features of National Partner Clouds
1. Physical and Logical Separation
Network Isolation:
- Dedicated network infrastructure
 - No direct connectivity to global Azure backbone
 - Separate DNS and domain names
 - Isolated from internet (for high-security regions)
 
Data Isolation:
- Customer data never leaves national boundaries
 - Backups and replication within national borders
 - No data transfers to global Azure without explicit customer action
 - Separate encryption keys and key management
 
Identity Isolation:
- Separate Azure Active Directory instances
 - No federation with global Azure AD by default
 - National identity providers supported (e.g., US PIV cards for Azure Government)
 
2. Compliance and Certifications
National Certifications:
National Partner Clouds obtain certifications from national authorities rather than just international bodies:
Azure Government (US):
- FedRAMP High (federal)
 - DoD CC SRG IL 2, 4, 5, 6 (defense)
 - CJIS (criminal justice)
 - IRS 1075 (tax information)
 - NIST 800-171 (controlled unclassified information)
 
Azure China:
- MLPS (Multi-Level Protection Scheme) - Chinese government
 - Trusted Cloud (China Academy of Information and Communications Technology)
 - Cybersecurity Review (Cyberspace Administration of China)
 
Process:
- National authority conducts assessment
 - Continuous monitoring and re-authorization required
 - Regular audits by national inspectors
 - Compliance evidence available to national auditors
 
3. Local Support and Operations
Operations Team:
- Based in-country
 - Subject to national employment laws
 - Cleared or vetted as required
 - Language and cultural expertise
 
Support Channels:
- Local phone support (in national language)
 - Email support via national support system
 - Escalation to partner, not Microsoft global support
 - Support tickets handled locally
 
Example: Azure Government Support:
- US-based support personnel only
 - Security clearances as required
 - 24/7 support via phone and portal
 - Direct escalation to government support team
 
4. Sovereign Update and Change Management
Partner-Managed Updates:
- Partner controls update schedule (not Microsoft)
 - Can delay or test updates before deployment
 - Aligns with national change management processes
 - Advance notice of changes to customers
 
Example Process:
- Microsoft releases update to partner
 - Partner tests in isolated environment
 - Partner schedules update during approved window
 - Partner notifies customers in advance
 - Partner deploys and monitors
 
Benefit: National authorities can review changes before deployment to sensitive systems
Customer Scenarios
Scenario 1: US Federal Agency - Healthcare Data
Organization: US Department of Health and Human Services (HHS) managing Medicare data
Requirements:
- FedRAMP High authorization mandatory
 - IRS 1075 compliance (tax data integration)
 - HIPAA compliance (health information)
 - US data residency required by law
 - US persons-only support access
 - Integration with government identity systems (PIV cards)
 
Solution: Azure Government
Implementation:
- Deploy in Azure Government Virginia and Texas regions
 - Sign FedRAMP High BAA (Business Associate Agreement)
 - Configure Azure Government Active Directory
 - Integrate with government PKI for PIV card authentication
 - Enable Azure Government-specific services:
    
- Azure Government SQL Database (HIPAA-compliant)
 - Azure Government Storage (FedRAMP High)
 - Azure Government Virtual Machines
 - Azure Government Key Vault (FIPS 140-2 Level 2)
 
 
Compliance Automation:
- Deploy FedRAMP High policy initiative
 - Enable Azure Policy for HIPAA and IRS 1075
 - Configure Security Center for government cloud
 - Continuous compliance monitoring and reporting
 
Outcomes:
- ✅ Achieved FedRAMP High authorization in 18 months
 - ✅ Integrated with government-wide identity systems
 - ✅ Processed Medicare claims with HIPAA compliance
 - ✅ All support provided by US persons with clearances
 - ✅ Data never leaves US government cloud
 - ✅ Passed annual government audits with zero findings
 
Sales Talking Point: “Azure Government is the only cloud authorized for FedRAMP High with full isolation from commercial cloud. It’s purpose-built for government with US persons-only support and compliance certifications that matter to federal agencies.”
Scenario 2: Multinational Corporation - China Operations
Organization: Global retail company with e-commerce operations in China
Requirements:
- China Cybersecurity Law compliance (local data storage)
 - E-commerce platform for Chinese customers
 - Integration with Alipay and WeChat Pay
 - MLPS Level 3 certification (Chinese government)
 - Local hosting of customer data (PII)
 
Solution: Azure China (21Vianet)
Implementation:
- Deploy in Azure China East (Shanghai) region
 - Separate Azure subscription for China operations
 - Deploy e-commerce platform:
    
- Azure China App Service for web application
 - Azure China SQL Database for product catalog
 - Azure China Cosmos DB for shopping cart
 - Azure China Redis Cache for session state
 
 - Integrate with Chinese payment providers (Alipay, WeChat Pay)
 - Configure Azure China CDN for content delivery across China
 
Compliance:
- Achieve MLPS Level 3 certification
 - Trusted Cloud Service Certification
 - Data residency in China mainland
 - 21Vianet local support and operations
 
Architecture Considerations:
- Global Architecture: Corporate systems in global Azure (US, EU)
 - China Architecture: Customer-facing systems in Azure China
 - Data Synchronization: One-way sync of product catalog (global → China)
 - No PII Transfer: Customer PII stays in Azure China only
 - Separate Identity: Azure China AD for China operations
 
Outcomes:
- ✅ Met China Cybersecurity Law requirements
 - ✅ Achieved MLPS Level 3 certification
 - ✅ Served 10M+ Chinese customers with local performance
 - ✅ Integrated with local payment providers
 - ✅ Local support from 21Vianet in Chinese language
 - ✅ No data transfer issues with Chinese authorities
 
Sales Talking Point: “Azure China operated by 21Vianet is the only way for global companies to legally and compliantly operate cloud services in China. 21Vianet handles all regulatory compliance, local support, and government relationships.”
Scenario 3: Defense Contractor - ITAR Workloads
Organization: Aerospace defense contractor managing ITAR-controlled technical data
Requirements:
- ITAR compliance (US persons only access)
 - FedRAMP Moderate minimum (pursuing High)
 - NIST SP 800-171 compliance
 - CMMC Level 3 certification required
 - Dedicated infrastructure for ITAR data
 - Hybrid architecture (on-premises + cloud)
 
Solution: Azure Government + Azure Local
Implementation:
Azure Government (Cloud):
- Deploy unclassified/CUI workloads in Azure Government
 - Use US DoD regions for defense-specific data
 - Enable ITAR controls:
    
- Network isolation (no public endpoints)
 - US persons-only support
 - Audit all access
 - Customer Lockbox enabled
 
 
Azure Local (On-Premises):
- Deploy Azure Local on-premises for highest sensitivity ITAR data
 - Disconnected mode for air-gapped operations
 - US persons-only physical access to data center
 
Hybrid Architecture:
- Azure Arc connects on-premises to Azure Government
 - Policy enforcement across hybrid environment
 - Unified monitoring via Azure Monitor (in Azure Government)
 - Backup to Azure Government for disaster recovery
 
Compliance:
- FedRAMP High authorization path
 - CMMC Level 3 assessment and certification
 - NIST SP 800-171 controls implementation
 - ITAR compliance audit passed
 
Outcomes:
- ✅ Achieved CMMC Level 3 certification in 12 months
 - ✅ Maintained ITAR compliance with US persons-only access
 - ✅ Hybrid architecture provides flexibility (cloud + edge)
 - ✅ Unified management across on-premises and Azure Government
 - ✅ Passed DoD security assessment
 - ✅ Enabled digital engineering for classified programs
 
Sales Talking Point: “Azure Government provides the isolation and compliance for ITAR workloads, while Azure Local enables air-gapped operations for highest-sensitivity data. Together, they provide a complete solution for defense contractors.”
Scenario 4: State Government - Criminal Justice
Organization: State Department of Public Safety managing criminal records and law enforcement data
Requirements:
- CJIS (Criminal Justice Information Services) compliance
 - FBI CJIS Security Policy adherence
 - State data residency requirements
 - Integration with state identity systems
 - Multi-agency data sharing (police, courts, corrections)
 
Solution: Azure Government
Implementation:
- Deploy in Azure Government Virginia (nearest to state)
 - Sign CJIS BAA with Microsoft
 - Implement CJIS Security Policy controls:
    
- Advanced authentication (MFA, biometrics)
 - Encryption in transit and at rest
 - Audit logging of all access
 - Personnel background checks (support staff)
 
 - Deploy applications:
    
- Records management system (RMS)
 - Computer-aided dispatch (CAD)
 - Law enforcement portal
 - Court case management integration
 
 
Network Architecture:
- ExpressRoute from state data centers to Azure Government
 - Azure Firewall for traffic inspection
 - Network Security Groups for micro-segmentation
 - Private endpoints for all PaaS services
 
Outcomes:
- ✅ Achieved CJIS compliance and FBI approval
 - ✅ Integrated across 50+ law enforcement agencies statewide
 - ✅ Real-time access to criminal records for officers
 - ✅ Improved officer safety with faster information access
 - ✅ Reduced infrastructure costs by 40% vs. on-premises
 - ✅ Enabled mobile access for officers in the field
 
Sales Talking Point: “Azure Government is FBI CJIS-approved and the only cloud platform with CJIS compliance at scale. State agencies can modernize criminal justice systems while maintaining strict security and compliance.”
Migration and Onboarding Process
Assessing Suitability for National Partner Clouds
Key Questions:
- Regulatory Requirements:
    
- Do national regulations mandate local cloud operators?
 - Are there data localization laws requiring in-country storage?
 - Are national compliance certifications required?
 
 - Government Affiliation:
    
- Is your organization a government agency?
 - Do you serve government customers or critical infrastructure?
 - Do you handle government-controlled data (classified, ITAR, etc.)?
 
 - Service Requirements:
    
- Do you need all Azure services, or is a subset acceptable?
 - Can you accept potential lag in new service availability?
 - Are you willing to work with partner support (not Microsoft direct)?
 
 - Cost Considerations:
    
- Can you accept potentially higher pricing (partner markup)?
 - Is dedicated infrastructure cost-effective for your use case?
 - Do compliance savings offset infrastructure premiums?
 
 
Decision Framework:
Is local operator legally required? 
├─ YES → National Partner Cloud
└─ NO → Is government compliance required (FedRAMP, CJIS, etc.)?
   ├─ YES → Consider Azure Government (US) or relevant national cloud
   └─ NO → Is data residency sufficient without local operator?
      ├─ YES → Sovereign Public Cloud (Microsoft Cloud for Sovereignty)
      └─ NO → Assess Sovereign Private Cloud (Azure Local)
Onboarding to Azure Government (US)
Eligibility:
- US federal, state, local, or tribal government
 - Contractors supporting government customers
 - Partners in government ecosystem
 
Steps:
1. Verify Eligibility (1-2 weeks)
- Complete eligibility screening
 - Provide government affiliation documentation
 - Sign Microsoft Online Subscription Agreement (MOSA)
 
2. Obtain Azure Government Subscription (1 week)
- Request Azure Government tenant
 - Set up billing (government purchase card, invoice)
 - Configure account administrators
 
3. Network Connectivity (2-4 weeks)
- Order ExpressRoute circuit (if needed)
 - Configure VPN connections
 - Set up hybrid connectivity
 
4. Identity Integration (2-3 weeks)
- Set up Azure Government Active Directory
 - Configure federation with on-premises AD
 - Enable PIV/CAC card authentication (optional)
 - Configure MFA
 
5. Migration (timeline varies)
- Assess and plan workload migration
 - Set up landing zones
 - Deploy Azure Policy for compliance
 - Migrate workloads
 - Validate compliance
 
Total Timeline: 2-3 months typical for initial production workloads
Official Onboarding Guide: Azure Government
Onboarding to Azure China (21Vianet)
Eligibility:
- Organizations operating in China (domestic or foreign)
 - Compliance with Chinese regulations required
 - Business license in China (for billing)
 
Steps:
1. Account Setup (1-2 weeks)
- Register account on Azure China portal (separate from global Azure)
 - Provide Chinese business license
 - Complete KYC (Know Your Customer) verification
 - Sign service agreement with 21Vianet
 
2. Billing Setup (1 week)
- Set up payment method (Chinese bank account or Alipay)
 - Configure billing in Chinese Yuan (CNY)
 - Understand invoicing process (different from global Azure)
 
3. Network Setup (2-4 weeks)
- Configure connectivity to Azure China regions
 - Set up VPN or ExpressRoute (if needed)
 - Plan for China’s internet restrictions (Great Firewall considerations)
 
4. Identity Integration (2-3 weeks)
- Set up Azure China Active Directory (separate from global Azure AD)
 - No federation with global Azure AD
 - Integrate with on-premises AD if needed
 
5. Migration (timeline varies)
- Note: Cannot directly migrate from global Azure to Azure China
 - Data must be manually transferred (export/import)
 - Re-deploy applications in Azure China
 - Reconfigure integrations and dependencies
 
Important Considerations:
- Separate subscription required (cannot use global Azure subscription)
 - Different pricing and service availability
 - Support provided by 21Vianet, not Microsoft
 - Great Firewall impacts connectivity to global services
 
Total Timeline: 1-2 months for initial deployment
Official Onboarding Guide: Azure China
Sales Talking Points
Value Propositions
1. “Meet National Requirements with Global Innovation”
- Azure services adapted for national sovereignty
 - Local operator ensures compliance with national laws
 - Access to Microsoft innovation through local partner
 - ROI: Compliance risk reduction, avoid penalties
 
2. “One Microsoft, Multiple Sovereign Options”
- Choose the right sovereign model for your needs
 - Transition between models as requirements evolve
 - Consistent Azure experience across all models
 - Flexibility: Not locked into one sovereignty approach
 
3. “Purpose-Built for Government”
- Azure Government designed from ground up for US government
 - Physical and logical isolation from commercial cloud
 - US persons-only support with clearances
 - Differentiator: Only cloud with FedRAMP High and DoD IL6
 
4. “Local Partnership, Global Backing”
- Local partner provides in-country expertise and support
 - Microsoft provides technology and continuous innovation
 - Joint support model ensures problem resolution
 - Best of Both Worlds: Local presence + global capabilities
 
Discovery Questions
Regulatory and Compliance:
- “What national or industry regulations require local cloud operations?”
 - “Do you have data localization requirements that mandate in-country operators?”
 - “What compliance certifications are required from your cloud provider?”
 - “Are there restrictions on foreign ownership or operation of your cloud infrastructure?”
 
Government and Critical Infrastructure:
- “Is your organization a government entity or do you serve government customers?”
 - “Do you operate critical national infrastructure?”
 - “Do you handle government-controlled data (classified, ITAR, CJIS, etc.)?”
 - “What clearance levels are required for personnel accessing your systems?”
 
Current Cloud Usage:
- “Are you currently using Azure, AWS, or other cloud services?”
 - “Do you have workloads in commercial cloud that need to move to government cloud?”
 - “What challenges have you faced with cloud sovereignty or compliance?”
 - “How do you currently handle data residency and sovereignty requirements?”
 
Technical Requirements:
- “Which Azure services are most critical to your operations?”
 - “Do you require all Azure services, or is a subset acceptable?”
 - “What are your network connectivity requirements (internet, ExpressRoute, VPN)?”
 - “How do you plan to integrate cloud with existing on-premises systems?”
 
Competitive Differentiation
vs. AWS GovCloud
Microsoft Advantages:
- Broader Government Cloud Portfolio:
    
- ✅ Microsoft: Azure Government (FedRAMP High + DoD IL6)
 - ⚠️ AWS: GovCloud (FedRAMP High, limited IL5)
 - Impact: Azure Government supports higher classification levels
 
 - Multiple National Clouds:
    
- ✅ Microsoft: Azure Government (US), Azure China, plus Sovereign Public Cloud globally
 - ⚠️ AWS: Only GovCloud US
 - Impact: Microsoft supports more countries with national cloud needs
 
 - Integrated Productivity Suite:
    
- ✅ Microsoft: Microsoft 365 Government, Teams Government, Dynamics 365 Government
 - ⚠️ AWS: No equivalent productivity suite in GovCloud
 - Impact: Complete platform for government (not just infrastructure)
 
 - Hybrid Government Cloud:
    
- ✅ Microsoft: Azure Local integrates with Azure Government via Azure Arc
 - ⚠️ AWS: Outposts requires persistent connectivity (not suitable for air-gap)
 - Impact: Hybrid government cloud with air-gap capability
 
 
vs. Google Cloud
Microsoft Advantages:
- Government Cloud Maturity:
    
- ✅ Microsoft: Azure Government launched 2014, mature and proven
 - ⚠️ Google: Limited government cloud presence
 - Impact: 10+ years of government cloud expertise
 
 - Compliance Portfolio:
    
- ✅ Microsoft: FedRAMP High, DoD IL6, CJIS, IRS 1075, ITAR
 - ⚠️ Google: Limited government certifications
 - Impact: More comprehensive government compliance
 
 - National Partner Clouds:
    
- ✅ Microsoft: Multiple national clouds (US, China)
 - ❌ Google: No national partner cloud program
 - Impact: Only Microsoft supports national cloud requirements globally
 
 - Government Customer Base:
    
- ✅ Microsoft: Thousands of government customers including DoD
 - ⚠️ Google: Smaller government customer base
 - Impact: Proven track record with government
 
 
Common Challenges and Solutions
Challenge 1: Service Parity with Commercial Cloud
Concern: “Do I get all Azure services in national partner clouds?”
Reality:
- Azure Government: 95%+ service parity with commercial Azure
 - Azure China: 80-90% service parity (some services restricted by Chinese regulations)
 - New services may lag commercial Azure by weeks to months
 
Solution:
- Review Azure Government service availability
 - Plan architecture around available services
 - Monitor service roadmap for upcoming availability
 - Alternative: Use Sovereign Public Cloud if need all services immediately
 
Challenge 2: Migration Complexity
Concern: “How hard is it to migrate from commercial Azure to national cloud?”
Reality:
- Azure Government: Moderate complexity (same Azure, different endpoints)
 - Azure China: High complexity (completely separate platform, manual migration)
 
Azure Government Migration:
- Reconfigure ARM templates with Azure Government endpoints
 - Re-deploy resources (VMs, databases, storage)
 - Reconfigure networking (VNets, NSGs, ExpressRoute)
 - Update application configurations
 - Timeline: 2-4 months typical
 
Azure China Migration:
- No automated migration tools
 - Must manually export data and re-import
 - Applications need to be re-deployed
 - No connectivity between global Azure and Azure China
 - Timeline: 3-6 months typical
 
Solution: Plan migration as a project with dedicated resources and timeline
Challenge 3: Cost Premiums
Concern: “Is national partner cloud more expensive than commercial Azure?”
Reality:
- Azure Government: Generally similar pricing to commercial Azure (sometimes slightly higher)
 - Azure China: Pricing set by 21Vianet (can vary, sometimes higher)
 - Dedicated infrastructure does carry some premium
 
Cost Justification:
- Compliance cost avoidance (penalties for non-compliance)
 - Risk reduction (data sovereignty, legal protection)
 - Support from local partner (in local language, local hours)
 - ROI: Compliance benefits often outweigh cost premium
 
Challenge 4: Separate Account Management
Concern: “Will I need separate accounts and billing for national clouds?”
Reality:
- Yes, national partner clouds require separate subscriptions
 - Cannot use same Azure subscription for commercial and national clouds
 - Separate billing, support, and management
 
Implications:
- Need separate Azure AD tenants
 - Separate billing and cost management
 - Cannot easily move resources between clouds
 - Need separate operational processes
 
Solution:
- Plan for separate management from the start
 - Use Azure Arc for unified visibility (where possible)
 - Document processes for each environment
 
Next Steps and Learning Resources
Continue Learning
- ← Back to Sovereign Cloud Models Overview
 - ← Previous: Sovereign Private Cloud
 - ← Previous: Sovereign Public Cloud
 - ✅ Take the Quiz →
 
Hands-On Learning
Additional Resources
- Azure Government documentation - Official Azure Government docs
 - Azure China documentation - Azure China 21Vianet docs
 - FedRAMP marketplace - FedRAMP authorized cloud services
 - Compare Azure Government and global Azure - Service comparison
 
Last Updated: October 2025