When Iranian Shahed 136 drones struck Amazon Web Services facilities in the UAE and Bahrain on March 1, 2026, the tech industry did not just lose servers. It lost a foundational assumption it had been quietly building on for years: that keeping data inside a country's borders was a form of protection. It was not. For many companies, it was the opposite.
This article is about Topic 2C of the post-attack conversation: the collision between data sovereignty law and physical survival. It is the most legally and technically complex fallout from the strikes, and it is the one that will reshape cloud infrastructure policy for the next decade.
What Data Sovereignty Laws Actually Required
To understand how things went wrong, you have to understand why Gulf governments built these legal frameworks in the first place. Data localization laws, which require that certain categories of data be physically stored within a country's borders, were not arbitrary. Gulf Cooperation Council states passed them to maintain political and regulatory control over sensitive citizen and government data. The argument was straightforward: if your data is on a server in another country, you are subject to that country's laws, not your own.
Bahrain took this further. It marketed itself as a "Data Embassy" for foreign companies, offering a unique legal framework where British or Bermudian firms, for example, could store data in Bahrain while it legally remained under their home jurisdiction. This was a commercial proposition as much as a legal one: tax-friendly, strategically located, and legally sophisticated. The pitch worked. AWS built its Bahrain region (ME-SOUTH-1) in 2019. The UAE followed with ME-CENTRAL-1 in 2022.
The Gulf became a hub. The UAE's data center market was on track to more than double from $3.29 billion in 2026 to $7.7 billion by 2031. Businesses that needed to serve Gulf customers were legally required to process data locally. Hyperscalers had no choice but to build physically in the region if they wanted access to those markets. The laws created demand. The data centers were built to satisfy that demand. And then the drones arrived.
How Those Same Laws Created a High-Value Target
Here is the problem that nobody fully articulated until after the attacks: when you pass a law that says data must stay inside your borders, you are not just asserting control. You are also creating a map. You are telling the world exactly where your most critical digital infrastructure is concentrated. You are making it stationary. And you are making it mandatory.
Standard disaster recovery practice involves distributing data across multiple geographic locations so that no single event can take everything down. Data localization laws directly contradict this principle. They prevent companies from moving data to safer regions during a crisis, which is precisely the moment when you would want to. The legal architecture built for sovereignty became an architectural weakness for resilience.
The attacks confirmed this in the most direct way possible. Iran's IRGC used Shahed 136 drones to strike two AWS data centers in the UAE and one in Bahrain, causing structural damage, power disruption, fires, and additional damage from fire suppression systems. Nearly 60 AWS services went down. Abu Dhabi Commercial Bank, Emirates NBD, First Abu Dhabi Bank, the payments platform Alaan, data cloud company Snowflake, and the ride-hailing giant Careem all reported outages. Ordinary people could not pay for groceries or catch a ride home.
AWS's standard Multi-AZ architecture, which is designed to keep data redundant across different buildings in the same geographic area, was not designed for a scenario where the entire region becomes a target. Multiple availability zones going down simultaneously exposed a gap that the system was never built to handle. Physical geography, not software architecture, became the decisive variable.
The Companies That Did Not Even Know
One of the most important and underreported aspects of this situation is how many companies discovered their exposure only after the attacks happened. They had no meaningful Middle East presence. They had never deliberately chosen to store data in Bahrain or Dubai. But their cloud workloads were being routed through those regions automatically, because cloud providers optimize for latency and traffic flows to the nearest data center.
When that nearest data center was struck, these businesses discovered that "the cloud" had a very specific geographic address they had not consented to. The cloud has always been physical. It is buildings, power cables, cooling systems, and fiber optic lines. It is just that most companies never had to think about where those buildings were until one of them was on fire.
This is not a niche problem for companies operating directly in the Gulf. It is a systemic issue with how cloud infrastructure works globally. Any company whose workloads were optimized toward Middle East points of presence was affected, regardless of where that company was headquartered or what markets it thought it was serving.
The Overnight Evacuation: Breaking the Law to Stay Online
After the strikes, AWS advised customers with workloads in the Middle East to migrate their data to alternate regions in Europe and Asia, warning that the disruption could be a "prolonged event." Tools like AWS Application Migration Service and CloudEndure became central to what people started calling a digital evacuation. The goal was to lift entire servers out of the conflict zone and restart them in Frankfurt, Ireland, Mumbai, or wherever had available capacity.
The problem is that such migrations are neither instantaneous nor seamless. Many applications are configured to operate within specific regions because of latency requirements, architectural dependencies, or the data sovereignty laws described above. Moving data out of Bahrain to comply with AWS's advice meant, for some companies, directly violating Bahraini data residency law. They were being asked to choose between staying compliant and staying online.
Most chose to stay online. The practical calculus was not complicated. A company with its data locked in a burning building is not serving customers regardless of whether it is legally compliant. The regulators were not going to help them restore services. The lawyers could sort out the compliance questions later. The engineers needed to act now.
This is the part of the story that the legal and compliance world has not fully reckoned with yet. Companies broke data localization laws en masse during the evacuation, and they did so because the alternative was complete operational failure. The law was written for a world where the biggest threat to data was a company moving it offshore for convenience. It was not written for a world where the threat was a military strike.
The Insurance Problem Nobody Is Talking About
There is a financial layer to this that compounds the legal one. Standard commercial property and business interruption insurance policies frequently exclude acts of war. Companies that assumed they were covered for data center outages discovered that their policies contained clauses that rendered the entire situation unclaimable. The only recourse is specialized war risk policies, which are expensive, complex, and aggressively contested by underwriters.
Under what legal experts are calling the Cuba Submarine precedent, any claims by private companies against state belligerents for damages from the 2026 strikes are highly unlikely to succeed in court. Iran is not going to compensate AWS or Emirates NBD for the losses. The data centers were, in a legal sense, operating in a foreseeable conflict zone. Courts are likely to treat the strikes as a known risk of doing business in that region, not as an unforeseeable act that creates liability for someone else.
This puts companies in a difficult position. They moved to the Gulf because data sovereignty laws required it. They could not move data out during the crisis without breaking those laws. Their insurance does not cover the losses. And they cannot sue the attacker. The entire risk, in other words, sits with the company. Not with the government that passed the localization law. Not with AWS. Not with Iran.
The Case for Emergency Portability
What the attacks have made clear is that data sovereignty law needs a wartime clause. Experts and engineers are now calling this Emergency Portability: a legal mechanism that allows data to move out of a country during a declared conflict, the same way citizens are allowed to evacuate. The idea is that sovereignty does not mean trapping data in a burning building. It means maintaining control over where that data goes and under what conditions.
The parallel to refugee law is not accidental. International law has long recognized that the normal rules governing movement across borders are suspended during emergencies. People fleeing a war zone are not required to produce visas. The argument being made now is that data should have the same kind of legal off-ramp. A company should be able to invoke an emergency clause, move its data to a pre-approved safe region, and restore operations, without that movement being treated as a violation of residency law.
This would require governments to think about data sovereignty differently. Instead of focusing purely on where data sits, they would need to focus on who controls it and under what legal framework it operates. Bahrain's Data Embassy concept was actually moving in this direction, allowing foreign legal jurisdiction over locally-stored data. The next step is to extend that logic to physical location: allowing data to temporarily reside elsewhere while remaining under the originating country's legal jurisdiction.
Whether governments are willing to make this move is a political question as much as a legal one. Sovereignty, even of the digital variety, is something governments are reluctant to compromise on. But the Bahrain situation has demonstrated concretely what the alternative looks like. A law designed to protect national data interest resulted in that data being destroyed or disrupted at scale, with no legal mechanism for recovery.
What Changes Now
The structural shift that follows from all of this is already underway. Multi-cloud architecture, which means distributing workloads across multiple cloud providers and regions rather than concentrating them in one place, is moving from a best practice to a baseline expectation. Single-provider, single-region deployments are starting to be seen as operationally reckless rather than just technically suboptimal.
Sovereign AI infrastructure is also becoming a national priority in ways that go beyond the Gulf. India, Japan, France, and the European Union are all investing heavily in domestic cloud capacity precisely because they do not want to be dependent on foreign infrastructure concentrated in geopolitically unstable regions. Microsoft committed $10 billion to Japanese AI infrastructure between 2026 and 2029. These investments are direct responses to the vulnerability that the Bahrain and UAE strikes exposed.
For the Gulf itself, the path forward is expensive. Governments that want to attract cloud investment will now need to demonstrate heightened security measures. The trillions of dollars pledged across the region for AI data infrastructure come with a new condition that was not there before: clients expect providers to have recovery plans, multiple facilities across a country, and realistic answers to the question of what happens if the building gets hit.
Potential defensive measures, such as reinforced concrete construction and dedicated air defense systems for data centers, are being discussed seriously for the first time. They are expensive and do not offer complete protection for large buildings. But the conversation is happening because the alternative, which is treating a hyperscale data center as an undefended civilian building in an active war zone, has been shown to have serious consequences.
The Lesson
Bahrain is not an isolated case. It is a preview. Every country that has passed data localization laws is operating under the same basic logic that failed in March 2026: that physical concentration of data inside borders is a form of control and protection. The attacks demonstrated that it can also be a form of vulnerability.
The cloud was always physical. It just took a 50-pound explosive to make that obvious to everyone who had not been paying attention. The question now is whether the legal frameworks that govern where data lives can catch up to the physical reality of what happens when the places it lives become targets. Data sovereignty is not a checkbox exercise anymore. It is a risk management question. And the answers will need to account for drones.
About QueryTel
QueryTel provides managed security and technology advisory services to enterprises across North America. This article was produced by the QueryTel Security Intelligence team. For inquiries regarding cloud resilience, disaster recovery planning, or infrastructure architecture consulting, contact the QueryTel advisory desk.
Was this article helpful?
Last updated: April 2026
Article ID: KB-CL-001