Knowledge Base
Pulling a few up-to-date references on data residency and international transfers now.The short version: compliance isn’t just about how you secure security telemetry; it’s also about where it lives, where it can be accessed from, and what legal regime applies to it.Why compliance and data location matter for security telemetrySecurity data (SIEM logs, alerts, incident notes, identity events) often contains personal data or data that can become personal data when combined (usernames, IPs, device IDs, email addresses, location hints). Once that’s true, you’re immediately in the world of:Data residency expectations (customer contracts, regulated sectors, public sector requirements).Cross-border transfer rules (UK GDPR / EU GDPR and equivalents).Auditability (being able to evidence where data is stored, who accessed it, and why).The UK ICO is explicit that organisations need to understand and manage the rules around international transfers and accountability obligations when personal data leaves the UK (or the legal boundary you’ve committed to). See: ICO – a guide to international transfers. (ico.org.uk)“Where is my Microsoft Sentinel data stored?” (practical reality)For Microsoft Sentinel specifically, Microsoft states that raw data is stored in the same region as the Azure Log Analytics workspace associated with Sentinel. That means your workspace region choice is a primary control for data location. See: Microsoft Learn – geographical availability and data residency in Microsoft Sentinel. (learn.microsoft.com)At the broader Azure level, Microsoft also frames data residency as: many services let you specify the region/geo where customer data is stored and processed (with service-specific nuances). See: Azure – data residency. (azure.microsoft.com)The compliance risks leaders actually get caught byCross-border access is still a risk: even if storage is “UK”, remote admin/support access from outside the UK/EU can create transfer considerations depending on your setup and contractual terms.Tooling sprawl creates hidden transfers: SIEM → ticketing → chatops → LLM assistant → reporting exports. Each hop can shift jurisdiction and retention.Retention and deletion obligations: SIEM data is “high value”, so teams keep it “just in case”. Compliance teams want justification, minimisation, and lifecycle controls.Multi-tenant operations (MSSPs) raise the bar: you must prove separation, least privilege, audit logs, and that one customer’s data doesn’t bleed into another’s workspace or analytics layer.What “good” looks like (a decision-maker checklist)Pick an explicit data residency stance (e.g., UK-only, EU-only, US-only, or “customer-chosen region”) and bake it into contracts and architecture.Control storage region at the SIEM core (Sentinel/Log Analytics workspace region choice is foundational). (learn.microsoft.com)Document international transfer mechanisms where relevant (and keep vendor DPAs and transfer terms current). (ico.org.uk)Prove governance: access logs, change management, incident handling audit trails, and tenant separation.Minimise export paths: only replicate data to secondary systems when there is a defined purpose, retention, and access model.If you tell me which compliance lens you care about most (UK GDPR, EU GDPR, ISO 27001, SOC 2, HIPAA, PCI DSS, or “customer contract-driven”), I’ll tailor this into a tight, publishable point-of-view piece aimed at CISOs and CEOs (including clear do’s/don’ts and a recommended architecture narrative).

