Menu
Cloudflare Blog·March 18, 2026

Cloudflare's Regional Services and Custom Regions for Data Sovereignty and Distributed Processing

Cloudflare's Regional Services and the new Custom Regions feature provide a unique architecture for balancing global network performance and security with local data sovereignty requirements. The system allows for global L3/L4 DDoS mitigation while ensuring sensitive data processing, like TLS termination and Layer 7 services, occurs strictly within user-defined geographical boundaries. This approach contrasts with traditional sovereign clouds by leveraging the full scale of Cloudflare's network for protection, routing clean traffic to specific regions for localized processing.

Read original on Cloudflare Blog

Leveraging a Global Network for Local Compliance

Cloudflare's Regional Services fundamentally differ from many sovereign cloud providers by not isolating traffic to a single geography for all processing. Instead, it utilizes the full scale of its global network for initial ingress and L3/L4 DDoS mitigation. This means that even if a request originates outside a customer's designated region, it benefits from Cloudflare's massive-scale protection before any sensitive data is processed locally. The core architectural decision here is to separate general network protection from data inspection and application-layer processing, enabling compliance without sacrificing security scale.

Architectural Overview of Regional Services

  • Global Ingestion & L3/L4 DDoS Defense: Traffic is ingested at the closest Cloudflare data center globally, where volumetric DDoS attacks are mitigated at the network and transport layers. This happens *outside* the designated region, ensuring only clean traffic is forwarded.
  • Intelligent In-region Routing: Before decryption, the request's metadata is inspected. If it's outside the specified region, it's routed over Cloudflare's secure, private backbone to a data center *within* the boundaries using the most performant pathway.
  • In-region TLS Termination & L7 Processing: Decryption and application-layer security services (like WAF, Bot Management) and Cloudflare Workers logic *only* occur once the traffic is confirmed to be inside the chosen region.
  • Secure Transit to Origin: After processing, the request is re-encrypted and sent to the origin server.
💡

Decoupling Protection from Processing

This architecture highlights a critical system design pattern: decoupling global-scale, less sensitive operations (like L3/L4 DDoS mitigation) from regional, sensitive operations (like TLS termination and L7 processing). This allows for maximizing performance and security while adhering to strict data localization rules.

Custom Regions: Dynamic Boundary Definition

Custom Regions extend the existing Regional Services by allowing customers to define their own geographical boundaries for traffic processing. Instead of pre-defined regions, users can specify locations using expressions based on `country_code`, enabling flexible definitions like "North America", "Everywhere except North America", or even "Countries that use Fahrenheit". This dynamic definition is crucial for compliance with evolving data sovereignty laws, optimizing AI inference, or mirroring complex corporate structures.

Enforcement and Resilience

The enforcement mechanism relies on a global distribution of region membership definitions. When a request arrives, the nearest data center performs a configuration lookup and a membership check. If the data center is *not* in the configured region, the request is forwarded to an optimal in-region data center. Resilience is built in through multiple candidate routing, health-aware routing, data quality gates, and a fail-close design: if no valid in-region destination exists, the connection fails rather than processing outside the region, ensuring strict adherence to boundaries.

data sovereigntyregional servicesedge computingDDoS mitigationcompliancenetwork architecturetraffic routingCDN

Comments

Loading comments...