United States
- U.S. clients may prefer U.S. regions or client-owned cloud where procurement/security requires it.

Shared responsibility
How cloud ownership, IAM, MFA, regions, network controls, secrets, encryption, logging, environment separation, patching, monitoring, and handover are handled.
Country pages link here for hosting, data residency, support, and client-owned cloud discussions.
This page is general onboarding and review information. It is not legal, tax, regulatory, cybersecurity, financial, or compliance advice, and it does not create certification claims or service commitments. Final obligations belong in signed agreements and approved project documents.
Responsibility
Responsibilities depend on whether the environment is client-owned, VarenyaZ-managed, third-party managed, or hybrid. The SOW should say who owns tenant administration, billing, IAM, backups, logging, patching, monitoring, and handover.
Controls
Cloud security may include region selection, IAM, MFA, network segmentation, secrets management, encryption in transit, encryption at rest, logging and monitoring, environment separation, backup configuration, infrastructure-as-code, patch management, vulnerability management, incident response, and cost monitoring.
Residency
Data residency, backup region, log region, support location, and subprocessor region expectations should be identified during discovery. Residency requirements can affect architecture, vendor selection, cost, and timeline.
Preparation
Review materials
Local overlays
Next review
How named accounts, MFA, least privilege, client approval, temporary production access, privileged access review, audit logs, and offboarding revocation are handled.
How backup responsibility, frequency, retention, encryption, location, restore testing, RTO, RPO, disaster recovery ownership, and client-cloud responsibilities are defined.
How hosting, support, subprocessors, backup regions, SCCs, UK transfer terms, and data-transfer review fit into onboarding.
When a DPA is needed, what processor terms usually cover, how subprocessors and transfers are reviewed, and what clients should prepare.
Use this page with the country onboarding guide so your legal, procurement, security, privacy, finance, and engineering teams have the right review path before contract signature.