Cloud Data Security & Resilience
,
Cloud Security
,
Cyberwarfare / Nation-State Attacks
It’s Time for CIOs to Rethink Business Continuity Plans and Cloud Resources

On Wednesday, Bahrain’s interior ministry confirmed that civil defense teams were extinguishing a fire at a facility after an Iranian airstrike. The company was identified as Batelco, the country’s largest telecom operator and host of AWS cloud. Then on Thursday, the Islamic Revolutionary Guard Corps said it targeted an Oracle data center in Dubai, United Arab Emirates, making good on its pledge to attack 18 U.S. technology and defense firms. It appears that commercial data centers are now targets during wartime.
See Also: Gen AI Stalls, Shadow AI Rises: A CISO Concern
A Pattern, Not an Anomaly
These latest attacks aren’t the first. In March 2026, Iranian Shahed drones attacked two AWS data centers in the UAE and damaged a third in Bahrain. Within three weeks, AWS facilities across the Middle East region were targeted four times. Each attack caused structural damage and disrupted services for both enterprises and governments alike. Iran’s intent has been clear.
Tehran’s Fars News Agency said the Bahrain facility was struck on Wednesday “to identify the role of these centers in supporting the United States’ military and intelligence activities.” The UAE’s Ministry of Interior denied any damage to the Oracle data center, calling it “fake news.”
The targeting demonstrates that commercial cloud infrastructure is no longer purely civilian. These are dual-use facilities, making them legitimate military targets during wartime. The U.S. military runs workloads on both AWS and Oracle clouds, including AI-powered intelligence analysis tools. Leaders of both companies, Jeff Bezos at AWS and Larry Ellison at Oracle, have close ties to U.S. President Donald Trump, as well as the Israeli business community.
The Enterprise in the Crossfire
For enterprise leaders, this signals a supply chain crisis. Earlier strikes in March caused service disruptions affecting banking systems, payment platforms and digital services across the Gulf region. AWS has advised customers to migrate workloads to other regions. It’s a significant operational challenge, carried out under pressure, with no visible recovery timeline.
Up to 17 submarine cables run through the Red Sea, carrying most of the data traffic between Europe, Asia and Africa. Iranian moves to close the Strait of Hormuz, along with renewed Houthi activity in the Red Sea, mean both critical data chokepoints are at risk. Successful attacks could trigger severe global disruption.
The region’s ambitions as a global AI investment hub have also been dealt a severe blow. Trump’s tour of the Middle East last year generated several trillion dollars in investment pledges, including the planned Stargate UAE campus in Abu Dhabi. Continued strikes on regional infrastructure raise concerns about that vision and dampen investor trust.
CIOs and Technology Leaders: A Resilience Blueprint
The month-long conflict between the United States, Israeli and Iran has raised many questions: Is cloud infrastructure safe from kinetic conflict? Can geographic diversification within a single region ensure resilience? Should business continuity planning also include nation-state-level military actions? Enterprise technology leaders now have to prepare for a world where these assumptions become norms.
CIOs deciding how to proceed should consider the following imperatives:
- Geopolitical risk is a top infrastructure concern. It’s time for CIOs to include geopolitical threat assessments in infrastructure planning. This involves collaborating with risk teams to identify the geopolitical exposure of each cloud region in use. Military conflicts could arise in many cloud regions.
- Ensure cross-regional, multi-cloud redundancy. Concentrating on a single cloud provider’s region – or even a single provider – is no longer prudent. AWS’ response to the Bahrain strikes was to advise customers to migrate workloads elsewhere. Companies with already implemented active-active multi-region architectures could withstand the disruption, but those relying on single-region setups face difficulties. Resilience must be built in from the start, not added later.
- Test business continuity plans with kinetic scenarios.Traditional disaster recovery drills focus on cyberattacks, hardware failures or natural disasters. Not many organizations run tabletop exercises against the scenario of a cloud region becoming inaccessible due to war. CIOs should mandate that business continuity testing now includes prolonged regional inaccessibility. Recovery time objectives must be pressure-tested against this timeline.
- Audit contractual obligations and cloud SLAs. Most cloud agreements include force majeure clauses that exempt providers from liability in events such as military conflict. CIOs and CISOs must understand exactly where their contractual protections end. For regulated industries such as financial services, healthcare and other critical infrastructure providers, the compliance implications of extended cloud unavailability are serious and may not be fully addressed in current frameworks.
The Uncomfortable Truth
There’s an uncomfortable truth at the heart of these attacks. It appears that cloud computing is a target, right alongside military installations. Commercial data centers are embedded in the military-industrial complex through government contracts, AI capabilities and the dual-use computing infrastructure. If data centers become critical hubs for the transit of military information, they will increasingly be targeted by both cyber and physical attacks.
Enterprises have very few options. CIOs and CISOs who begin planning now increase their odds of recovering from the next strike. Those who treat this as a regional anomaly, unlikely to recur anywhere else, are making a strategic error that could end badly.
