Cloud Sells Geographical Abstraction. Critical Systems Buy Geographical Proximity.
What recent disruptions around AWS infrastructure in the Gulf reveal about latency, sovereignty, and the hidden geography of modern cloud systems
We like to talk about “the cloud” as if software has escaped geography.
The interface encourages that illusion. You choose a region, deploy a service, replicate some data, add a failover plan, and the system starts to feel abstract. Compute is elastic. Storage is managed. Infrastructure appears to have become location-independent.
But critical systems do not really stop living somewhere.
They still sit on top of power, cooling, fiber, telecom topology, legal jurisdiction, operational teams, and the physics of latency. And the more a system becomes real — real users, real regulation, real response-time constraints, real business consequence — the more geography tends to re-enter the design.
That is the part cloud culture hides well: cloud abstracts geography at the interface level, but many important systems reintroduce geography at the architecture level.
Recent disruptions around AWS infrastructure in the Gulf make that harder to ignore. Reuters reported issues affecting AWS data centers in the UAE and Bahrain amid Iranian strikes, including problems tied to power and connectivity. Separate Reuters reporting also described incidents in the UAE involving drone interceptions and falling debris in Fujairah. Whether one looks at these as isolated disruptions or as signals of a broader shift, the underlying point is the same: data centers are no longer just “IT facilities.” They increasingly sit inside the same map of strategic exposure as energy, ports, and communications infrastructure.
That does not just make cloud infrastructure more important. It makes geography more important.
The abstraction is useful. The abstraction is also misleading.
This is not an anti-cloud argument.
Cloud abstractions are powerful because they compress operational complexity. They let teams build and scale systems without owning every layer directly. They make certain kinds of resilience easier to implement. They lower coordination cost. They make global software feel tractable.
But useful abstractions have a habit of concealing the substrate.
In cloud, the concealed substrate is not just hardware. It is geography.
A lot of modern software is designed as if “where it runs” is a secondary implementation detail. For some workloads, that is mostly true. For critical ones, it often is not.
Latency-sensitive systems want to be physically closer to where requests originate. Regulated systems want data to remain in specific jurisdictions. Operationally important systems want predictable local integration with identity, networking, observability, and response teams. Once those requirements become strong enough, the architecture starts to pull back toward place.
So while the cloud sells a kind of placelessness, critical systems often buy proximity instead.
Latency quietly defeats the fantasy of placeless compute
The first force that brings geography back is latency.
Latency is often described as just a technical metric. In practice, it is a design constraint that pushes infrastructure back into physical space. If response time matters, distance matters. If user experience matters, path length matters. If control loops matter, locality matters.
This is not theoretical. AWS explicitly recommends choosing regions close to users for latency reasons, and sells Local Zones and Wavelength for workloads that need to run nearer to end users and telecom networks. Microsoft says similar things about Azure Extended Zones for low-latency and data-residency-sensitive workloads.
At the interface level, cloud encourages us to think in regions, services, and APIs. At the architecture level, latency-sensitive systems often say something much simpler:
put the system near the place where the consequences happen.
That is already a partial collapse of abstraction.
Sovereignty brings geography back a second time
The second force is law.
Even if a workload could technically run anywhere, that does not mean it is allowed to. Data residency, sector-specific regulation, national security requirements, and jurisdictional constraints all push architecture back toward geography. That is why sovereign cloud offerings now exist at all. AWS has launched a European Sovereign Cloud specifically for stricter residency and operational autonomy requirements, while Google and Microsoft document controls for customers that cannot treat geography as interchangeable.
This is a useful correction to one of cloud’s most seductive promises.
People say cloud gives you geographic flexibility. Sometimes it does. But in important systems, law can be just as constraining as physics. The workload may appear abstract, but its permitted runtime geography can still be narrow.
Once again, cloud did not remove geography. It pushed geography behind a cleaner control plane.
The result is hidden concentration
This is where the systems point matters.
Cloud encourages a mental model of distribution. Critical systems often rebuild concentration underneath that model.
Not recklessly. Often for completely rational reasons:
lower latency
data residency
operational simplicity
cost structure
regional business requirements
local ecosystem dependence
Each decision can make sense in isolation. But in aggregate, a system may look globally abstract while the important runtime, data, and dependency paths remain tied to a much narrower geography.
That is where hidden fragility comes from.
The problem is not that cloud is fake. The problem is that cloud can make concentration feel more diversified than it really is.
A clean interface can hide a concentrated substrate.
And once that substrate becomes strategically important, the illusion gets expensive.
That is why the AWS example in the Gulf matters beyond the specific incident. It is not only a story about one provider or one region. It is a visible reminder that cloud infrastructure now sits close enough to the center of commerce, communications, and increasingly AI-related compute demand that it begins to resemble critical infrastructure in the older sense of the term. And critical infrastructure is always geographic.
Good architecture can counter this — but not by accident
Cloud does not automatically imply weak geographic resilience. In fact, major providers explicitly support multi-region architectures, active-active designs, and cross-region failover. Google recommends multi-region deployments to improve latency and availability, and AWS Well-Architected explicitly warns against consolidating all workload resources into one geographic location. AWS also documents active-active multi-region patterns for low-latency and high-availability systems.
Cloud does not diversify geography by default just because it is cloud.
That has to be designed.
And the design often runs against real pressures:
performance wants locality
regulation wants jurisdictional specificity
operations want manageable complexity
economics want concentration where scale is cheapest
Resilience is not the natural resting state. It is a deliberate counterweight to optimization pressure.
That is the systems lesson.
Why this matters more now
This matters more than it used to because modern systems are becoming more dependent on concentrated compute.
As more of business, communications, platforms, and AI workloads sit on top of large cloud regions and data center clusters, the abstraction becomes more consequential — and more dangerous to misunderstand. The cloud did not make geography disappear. It made geography easier to ignore until latency, law, outage, or conflict forces it back into view.
At that point, the important question is no longer whether cloud is “really distributed.”
The better question is:
How much geographic reality has your architecture quietly reintroduced underneath the abstraction — and have you designed resilience there on purpose, or just assumed the word cloud already did that for you?
Because that assumption is where a lot of hidden concentration begins.


