Chat on WhatsApp

Cloud Standards in Morocco: What the 2025 Regulation Requires of Service Providers and Businesses

Cloud Platform in Morocco

Summarize this article with AI:

In August 2025, the Head of Government signed a decree that marks a turning point for cloud computing in Morocco. This decree, published in Official Gazette No. 7432, establishes a specific set of qualification standards for all cloud service providers working with sensitive entities. In practical terms, it translates the obligations of Decree No. 2-24-921 of October 2024 into measurable technical and organizational requirements.

For affected companies, choosing an unqualified cloud service provider is no longer an option. Here’s what this framework covers and how it will affect you in 2026.

To understand the basics of the sovereign cloud and its benefits, start by reading our comprehensive guide to the sovereign cloud in Morocco.

Key Takeaways

  • Decree No. 3-17-25 of August 1, 2025 establishes an official qualification framework for cloud service providers.
  • It applies to critical entities and infrastructure that hold sensitive data.
  • Two levels of qualification: Level 1 (standard) and Level 2 (full sovereignty over Moroccan territory).
  • The DGSSI is the authority responsible for reviewing and issuing the certification.
  • The framework covers more than 15 areas: encryption, access control, data localization, incident management, audits, and service agreements.
  • Every qualified service provider is subject to at least one annual audit conducted by a qualified auditor.

What is the legal framework behind this standard?

This framework did not come out of nowhere. It is part of a legal system that has been developed over several years.

From Law 05-20 to the 2024 Cloud Decree

Law No. 05-20 on cybersecurity, adopted in 2020, entrusted the DGSSI (General Directorate for Information Systems Security) with the mission of protecting critical information systems. In October 2024, Decree No. 2-24-921 specified the conditions under which sensitive entities may use the cloud.The order of August 1, 2025, completed the framework. It defines the specific requirements that each service provider must meet to obtain its cloud certification.

Who is subject to this requirement?

The legislation applies to critical infrastructure entities and facilities that maintain sensitive information or data systems. In practice, this includes government agencies, public institutions, telecommunications providers, banks, and strategic companies. Any such entity that outsources its data to the cloud must use a service provider certified by the DGSSI.

SMEs that do not fall into this category are not directly subject to the requirement. However, they may choose a qualified service provider to enhance their credibility and security posture.

An explanation of the two qualification levels

The framework distinguishes between two levels. The choice of level depends on the sensitivity of the data and the degree of sovereignty required.

Level 1: Standard qualification with strict supervision

Level 1 requires compliance with all technical and organizational requirements of the framework. The service provider may perform certain support operations from abroad. These remote operations must then be conducted via a secure gateway (relay station). An authorized individual, who has passed the framework’s security checks, must supervise each action in real time from Morocco.

Level 2: Data and administration exclusively in Morocco

Level 2 imposes strict requirements. Sensitive data must be stored, processed, and managed exclusively within Moroccan territory. Encryption keys remain under the sole control of the client (the “principal” in the text). Technical data (administrator identities, logs, certificates, access configurations) must also reside in Morocco, without exception. In the event of a security incident, the Level 2 service provider must rely solely on a qualified incident response provider.

Comparison of the two levels

CriterionLevel 1Level 2
Sensitive dataHosted under the service agreementExclusively in Morocco
Technical specificationsIn Morocco (recommended)In Morocco (mandatory and exclusive)
Remote supportAvailable via a secure gatewayPossible with strict oversight
Encryption keysManaged by the service providerKnown only to the customer
Service AdministrationFrom Morocco or abroad (boxed)From Moroccan territory
Incident ResponseDocumented procedureCertified incident response provider (required)
DGSSI AuditYes, minimum annualYes, minimum annual

Key technical requirements of the standard

The framework covers more than 15 areas. Here are the key points companies should check with their service provider.

Encryption and Key Management

The service provider must encrypt data in transit and at rest. The protocols used must be up to date and comply with international standards. For Level 2, the private keys used to encrypt stored data must be known only to the customer. The service provider must also implement a complete key lifecycle: generation, distribution, storage, revocation, and secure destruction. Passwords are stored only in salted hash form.

Access Control and Multi-Factor Authentication

Access control is based on the principle of least privilege. Permissions are reviewed annually. The service provider’s and the client’s administrative interfaces are strictly separated.Multi-factor authentication is required for all access to administrative interfaces. The service provider’s administrative accounts must never be accessible from a public network.

Data Location and Service Agreement

The service provider must inform the customer of the exact location where their data is stored and processed. For Level 2, no exceptions are permitted: all data must remain within Moroccan territory.

Each service is governed by a service agreement subject to Moroccan law. This agreement specifies the responsibilities of each party. It includes a reversibility clause and allows the client to terminate the agreement without penalty if the service provider loses its qualification. The service provider must also provide, upon request, information regarding the risks associated with the exposure of data to foreign legislation.

Audits, Incidents, and Business Continuity

The service provider must establish a three-year audit plan. At least one audit per year must be conducted by a qualified audit firm. The DGSSI may also audit the service at any time.

Incident management follows a documented procedure. The service provider immediately notifies the customer and the relevant authorities. The customer may select the severity levels for which they wish to be notified. A business continuity plan and regular backups are mandatory. Backups are subject to the same security requirements as the primary site.

Physical Security of Data Centers

The guidelines require that the premises be organized into three types of zones: public, private, and sensitive. Sensitive zones are exclusively dedicated to housing the production information system. Access to these zones is individually controlled, tracked, and logged for at least three months. Protective measures against fire, water leaks, and power outages (such as UPS systems and generators) are mandatory.

The Qualification Process in Practice

The qualification process consists of four stages, in accordance with Articles 6 through 10 of Decree No. 2-24-921.

1

The service provider submits a qualification application to the DGSSI. The templates are published on the website of the national cybersecurity authority.

2

The DGSSI is reviewing the application. It may request additional documents regarding the articles of incorporation, the identities of the partners, the individuals involved in management, or references.

3

The service provider shall undergo the technical and organizational audits required by the standards.

4

The certification is granted (or denied). The certified service provider must indicate its status in each service agreement.

The guidelines also specify that IaaS, PaaS, and SaaS services are covered. Traditional external hosting services (dedicated or shared) are treated as IaaS services. Only colocation is excluded from the scope.

Comparison of Cloud Service Models in Morocco by Responsibility

What businesses need to do right now

If your organization handles sensitive data or operates critical infrastructure, here are the steps you should take.

Verify that your current cloud service provider is certified by the DGSSI or in the process of obtaining certification. Determine the certification level appropriate for the sensitivity of your data. Review your service agreement: it must comply with the framework (Moroccan law, reversibility clause, specified location). Insist on transparency regarding the location of data centers, encryption mechanisms, and incident response procedures. This framework represents a major step forward for the Moroccan cloud ecosystem. It establishes clear and verifiable requirements for the protection of data hosted in the cloud.

FAQ

What is the Moroccan Cloud Qualification Framework?

This is a set of technical and organizational requirements established byOrder No. 3-17-25 of August 1, 2025. It defines the criteria that cloud service providers must meet to obtain certification from the DGSSI. It covers security, encryption, access control, data localization, audits, and business continuity.

What is the difference between Level 1 and Level 2 certification?

Level 1 allows certain operations to be conducted from abroad, subject to strict oversight via a secure gateway. Level 2 requires that all sensitive and technical data be stored, processed, and managed exclusively within Moroccan territory. Encryption keys remain under the sole control of the customer.

What types of cloud services are covered by the framework?

The framework covers IaaS, PaaS, and SaaS services. It also treats traditional external hosting (dedicated or shared) as IaaS services. Only colocation is excluded from the scope.

How can you verify that a cloud service provider is qualified?

The DGSSI publishes information regarding certification on its website. The service provider must indicate its status as a certified provider and includethe certification in the service agreement signed with you.

Does this framework apply to small and medium-sized enterprises?

Not directly. The requirement applies to critical entities and those that handle sensitive data. SMEs that do not fall into this category may voluntarily choose a qualified service provider to enhance their compliance and security.

Source: Decree of the Head of Government No. 3-17-25 of 7 Safar 1447 (August 1, 2025), published in the Official Gazette No. 7432 of August 21, 2025. View the full text.

SEO Expert

Ismail oversees SEO at NindoHost, working on expanding online visibility across African hosting markets. He creates clear, actionable tutorials and guides that help users navigate web hosting at every stage of their website journey.

Leave a Reply

Your email address will not be published. Required fields are marked with an asterisk (*)

Other articles selected for you
An illustration of shared hosting with multiple websites on a single server

What is shared hosting?

Are you launching a website and looking for an affordable web hosting solution? Shared hosting is the most common choice for setting up a website