Digital Sovereignty Starts at the Network Layer
Audience: isp6 members, CIOs, CTOs, infrastructure directors, heads of architecture, and technology leaders responsible for cloud strategy, business continuity, and regulatory posture.
Last updated: April 2026
Table of Contents
- Introduction — the strategic blind spot
- Network operator assigned vs. BYOIP via isp6
- Vendor lock-in becomes structural
- Reputation is rented, not built
- Compliance exposure grows with every regulation
- What changes with portable addressing
- Next steps
- Further Reading
1. Introduction — the strategic blind spot
Most organisations have invested heavily in securing their applications, encrypting their data, and negotiating favourable cloud contracts. Yet very few have asked a fundamental question: who actually controls the network identity our entire digital operation depends on?
For the majority of businesses running on public cloud, the answer is their network operator. The IP address space their services announce to the Internet is allocated from the operator's pool, tied to that operator's account, and surrendered the moment the relationship ends. Every DNS record, firewall rule, certificate, and email reputation signal is anchored to addresses that cannot move with you.
This is not a networking detail. It is a strategic dependency.
isp6 — a RIPE NCC accredited Local Internet Registry — exists so that your organisation does not have to accept that dependency as a fact of doing business on the Internet. Through the isp6 portal, your organisation orders IPv6 Provider Assigned address space drawn fresh from our RIPE allocation, completes identity verification, and receives a pristine /48 or /44 block registered in the RIPE Database within hours. From that point forward, the block is announced by you, from any network you choose.
2. Network operator assigned vs. BYOIP via isp6
| Dimension | Network operator assigned | BYOIP via isp6 |
|---|---|---|
| Vendor lock-in | Structural — migration requires re-numbering | Eliminated — announce your prefixes from any provider |
| Business continuity | Dependent on single provider's availability | Portable across providers, regions, and data centres |
| IP reputation | Inherited and surrendered with each provider change | Built on your own clean allocation, retained permanently |
| Regulatory posture | Dependency on provider's compliance and terms | Documented end-user control under a RIPE NCC accredited LIR |
| Contract leverage | Provider holds switching-cost advantage | Symmetric — your addresses move with you |
| Security controls | Delegated to provider's routing and RPKI policies | Direct control over ROAs, reverse DNS, and BGP policy |
isp6 is a RIPE NCC accredited Local Internet Registry. We allocate pristine IPv6 address space that you can announce from any network using BYOIP — self-service, operational in hours, and fully portable between providers. For enterprises that need addresses registered directly to their organisation, we also sponsor Provider Independent allocations through isp6 as the sponsoring LIR. Here's what each risk looks like, and how isp6 addresses it.
3. Vendor lock-in becomes structural
Cloud providers allocate IP addresses from their own pools. Your services, DNS records, allow-lists, and partner integrations accumulate around those addresses. Migrating away means re-numbering your entire network — every DNS zone, firewall policy, SPF record, and ROA entry.
This is not a migration cost. It is a migration barrier — and it gives your incumbent provider leverage in every contract renewal.
4. Reputation is rented, not built
IP reputation — the trust signals that determine whether your email reaches inboxes, your traffic is flagged by threat feeds, and your API calls are rate-limited — is tied to address space. With provider-assigned addresses, you inherit whatever reputation history those addresses carry. You also surrender the reputation you build when you leave.
Organisations that depend on email deliverability, financial processing, or API partnerships cannot afford to treat IP reputation as disposable.
5. Compliance exposure grows with every regulation
The EU's NIS2 Directive, DORA, and evolving cybersecurity frameworks increasingly require organisations to demonstrate control over critical digital infrastructure. Regulators are asking not just where data is stored, but how the network infrastructure that carries it is governed.
An organisation that cannot demonstrate control over its address space may find itself explaining a dependency chain governed by a cloud provider's terms of service — not the organisation's own policies.
6. What changes with portable addressing
When your IPv6 allocation comes from isp6 as your LIR rather than your network operator's pool, you can announce those prefixes from any network — AWS, Azure, Google Cloud, a colocation facility, or all four. Multi-cloud and hybrid-cloud strategies stop being theoretical and start being operational.
Business continuity plans gain a real foundation: failover means re-announcing prefixes from a different location, not re-numbering under pressure. Your negotiating position strengthens because your provider knows your addressing isn't tied to their platform. And your security posture improves through direct control over routing policy, ROAs, and reverse DNS.
These are not theoretical benefits. They are operational controls that reduce attack surface, support audit requirements, and shift contract leverage in your favour.
7. Next steps
The shift from operator-locked to portable addressing is not disruptive. It does not require re-architecting applications or changing cloud providers. It is an additive step — one that gives your organisation a permanent, portable network foundation that every other infrastructure decision can build on.
isp6 exists to make that step straightforward. Membership is self-service, identity verification is handled in the portal, and your allocation is registered in the RIPE Database within hours — ready to announce from any network on day one.
8. Further Reading
Related Articles
- Building an IPv6 Integrated Project Team — the organisational counterpart to this article: why IPv6 adoption succeeds as a cross-functional programme, not a networking project
- Planning Your isp6 Allocation — sizing and structuring a /48 or /44 once your portable allocation is in place
- Bring Your Own IPv6 to AWS — announcing your isp6 PA space from AWS, including IPAM vs EC2 CLI workflows
- Bring Your Own IPv6 to Azure — Custom IP Prefix hierarchy for isp6 members
- Bring Your Own IPv6 to Google Cloud — PAP/PDP model for isp6 members
External References
- RIPE NCC — IPv6 Address Allocation and Assignment Policy
- RIPE NCC — Provider Independent (PI) Assignments
- EU NIS2 Directive — Official text
- Digital Operational Resilience Act (DORA)
This document is provided for informational purposes. Protocol specifications and cloud provider behaviour are subject to change. Consult the linked RFCs and vendor documentation for authoritative, up-to-date information before making architectural decisions.