Reading Time: 5 minutes
Category: Trends and Reports
Author: Yann Lazar
Summary
A guide to understanding sovereignty, cost, and the true price of vendor-controlled data lakes.
Security teams have been conditioned to ship their logs into vendor-controlled data lakes – but that model is breaking.
It creates sovereignty risks, hides cloud spend, inflates storage without adding detection value, and locks organizations into architectures they canโt control.
This blog post explains why modern detection must evolve beyond the โYour Logs, Their Cloudโ pattern. Cloud waste is rising because log volume grows quietly within cloud space organizations already pay for – much of which they never fully use or have visibility into – while the security value it delivers stays the same. Traditional SIEM and MDR tools amplify this problem by replicating and retaining data inside their own clouds, often far outside the organizationโs governance.
A new model is emerging: keep your logs in your cloud, under your rules. With MDR Detectโข, ON2IT analyzes, enriches, and correlates telemetry directly inside your environment – without building yet another vendor lake. This approach restores sovereignty, clarifies cloud costs, simplifies compliance, and prevents storage from dictating your detection strategy.
If youโre rethinking data ownership, cloud waste, or vendor lock-in in your managed detection and response program, this guide explains what needs to change – and how to start.
The Shift: Security Data Is Becoming a Liability – Not an Asset
For years, the industry has been conditioned to believe that shipping logs into a vendorโs data lake is simply โhow MDR works.โ
But that assumption is now eroding fast.
Research shows that 8 in 10 organizations are concerned about data sovereignty, and the impact of geopolitical and regulatory pressures on where their data is stored and processed. This concern is especially acute when critical security telemetry is processed, replicated, or retained in environments where organisations lack full visibility or control, heightening both compliance and cyberโrisk exposure
When logs leave your environment, three things happen immediately:
- Your sovereignty diminishes
- Your portability decreases
- Your cloud costs rise
Today we cover why this happens-and why the next generation of detection is shifting toward architectures where organizations own their logs and the cloud they live in.
What You Lose When Logs Leave Your Cloud
For many organizations, detection pipelines were built around SIEM and data-lake architectures from a different era. These systems centralize everything, move data into vendor-managed storage, and create layers of replication that are invisible to the customer.
This introduces sovereignty risks that are no longer acceptable in a world shaped by GDPR, regional data residency commitments, and increasing audit pressure.
- What actually happens when logs leave your cloud?
- Retention becomes controlled by a third party
- Replication patterns are opaque
- Residency can shift across regions
- Governance teams lose visibility
- Retrieval becomes slow or expensive
The irony is that organizations are losing sovereignty not to attackers – but to the tools meant to protect them.
Cloud Waste Is Rising Because Logs Are Growing Faster Than Value
Cloud spending was supposed to scale with business need – but for many organizations, it has turned into an uncontrolled drag on budgets. The issue isnโt that cloud is expensive; itโs that most teams donโt have visibility into whatโs driving the bill, especially when it comes to security logging.
Cloud costs rarely explode overnight – they creep. A few more days of retention here, a handful of new log sources there, and suddenly security teams are paying for cloud spaces they donโt use or have zero visibility into. Itโs a familiar pattern: the logging footprint grows quietly within the cloud space youโre already paying for – but the detection value stays the same.
That quiet creep is why many organizations now believe around a fifth of their cloud spend goes to waste. Not because the cloud is inefficient, but because theyโve lost visibility into whatโs being collected, why itโs being kept, and how it multiplies once it lands in a vendorโs data lake.
When detection depends on shipping everything to someone elseโs storage, costs rise by default. Pipelines ingest too much, retention becomes a habit instead of a decision, and storage expands in the background with no natural ceiling. At that point you’re no longer paying for detection – you’re paying for gravity. This is the real problem with traditional data-lake-heavy approaches: the architecture itself guarantees growth, even if the security value doesnโt.
The Architectural Problem: When Detection Becomes a Storage
Traditional SIEM and centralized MDR pipelines assume that โmore logs = better detection.โ
But as data volumes explode, the opposite is happening:
- The storage footprint grows faster than the detection ROI
- Teams pay for cloud space they never use or for retaining data that contributes nothing to security outcomes
- Vendor pricing becomes unpredictable as ingestion increases
- Retention obligations balloon without clear justification
- Moving away from a vendor becomes financially painful
This is why many organizations now question whether sending all logs to a vendorโs cloud is still the right strategic choice.
A modern managed detection and response strategy requires something different: control.
A Better Approach: Keep Your Logs, Keep Control
Modern MDR doesnโt need your data to leave your environment. It doesnโt need another vendor-owned lake. And it definitely doesnโt need to turn security into a storage problem.
With MDR Detectโข, your logs stay exactly where they belong – in your cloud, under your rules. We bring the detection to you: enrichment, correlation, analysis, and response all happen inside your environment, without siphoning your telemetry into someone elseโs architecture.
The impact is immediate:
- Sovereignty isnโt a question mark anymore – your data stays in your region, your environment, your control.
- Cloud spend finally makes sense – no mysterious storage growth, no surprise retention charges.
- Retention becomes a choice, not a vendor default – you decide what stays, for how long, and why.
- Switching vendors doesnโt require a data extraction nightmare -your logs stay put, so migration is clean.
- Costs scale the way they should – on your terms, aligned with your governance, not a vendorโs footprint.
This is detection without the baggage.
A model built for outcomes, not for inflating storage metrics.
A shift away from โsend us everythingโ and toward actual control.
Itโs where managed detection and response needs to go – and where MDR Detectโข already is.
How to Move From โYour Logs, Their Cloudโ to โYour Logs, Your Cloudโ
Modernizing your detection strategy doesnโt require a full transformation on day one.
Hereโs how organizations typically begin:
1. Start by assessing where your security data actually lives
Most organizations are surprised to learn just how many copies of their logs exist across vendors and regions.
2. Map retention requirements to real regulatory and operational needs
Retention should be intentional – not dictated by a vendorโs architecture.
3. Evaluate how much of your cloud bill is tied to logging and analytics
Even small ingestion reductions can lead to substantial savings.
4. Shift to MDR models that operate within your cloud
This is the key step that changes everything: sovereignty, cost control, portability, and long-term independence.
MDR Detectโข is built to support this transition without breaking workflows or losing visibility.
Whatโs Next: Take Back Control of Your Security Data
The old MDR model – ship everything to a vendor lake and hope for the best – is collapsing under its own weight. Too costly. Too opaque. Too dependent on someone elseโs cloud.
Modern security demands the opposite:
- Your logs
- Your cloud
- Your rules
MDR Detectโข makes that shift real. Detection, enrichment, correlation, and response all happen inside your environment – without handing your data to a vendor or paying for storage growth you donโt control.
If youโre ready to reduce waste, regain sovereignty, and break free from data-lake lock-in, this cluster will show you how. Start exploring, compare architectures, and see why the future of detection belongs to organizations that keep control of their own data.
Make Zero Trust Feel Clear, Not Complicated
Step into a world where cybersecurity finally makes sense. Our Dictionary helps you cut through the noise, understand the language, and feel confident in every conversationโno matter your expertise level.
FAQ
1. Why is data ownership important in managed detection and response (MDR)?
Because where your logs live determines who controls retention, replication, cost, access, and portability. When logs are stored in a vendorโs cloud, you inherit their architecture – and their limitations. Keeping logs in your own cloud keeps sovereignty, compliance, and cost governance in your hands.
2. Whatโs the problem with vendor-controlled data lakes?
Vendor data lakes centralize your logs in their environment, not yours. This creates opaque retention, escalating storage costs, cross-region replication you canโt govern, and painful lock-in when you try to change vendors. You lose visibility and portability the moment your logs leave your cloud.
3. How does cloud waste relate to security logging?
Security logging is one of the biggest drivers of unnecessary cloud spend. Logs accumulate automatically, retention expands quietly, and centralized data lakes replicate data behind the scenes. This leads many organizations to waste a significant portion of their cloud budget on data that adds little or no detection value.
4. How does ON2ITโs MDR Detectโข reduce cloud waste?
By analyzing logs directly inside your cloud. No vendor lake. No ingestion tax. No forced retention. Just targeted detection, enrichment, and correlation using the logs you already generate – stored where you already store them. Detection becomes smarter, and storage stays under your governance.
5. Does keeping logs in my cloud impact detection quality?
No. MDR Detectโข brings the detection engine to you – enrichment, analytics, timelines, correlation, and response all run inside your environment. You gain control without sacrificing speed, fidelity, or depth. Itโs modern MDR without the storage baggage.
6. Will this make it easier to switch MDR providers later?
Yes. When your logs stay in your cloud, migration is clean and straightforward. No data exports, no retrieval fees, no multi-terabyte transfers. You keep the telemetry – vendors simply plug into the environment you already control.
7. Does this approach help with compliance and data residency?
Absolutely. Because logs stay in your environment, you maintain direct alignment with regional, regulatory, and industry-specific requirements. You define retention, residency, access, and deletion – not the vendorโs architecture.
8. Why is the โlog-yourselfโ architecture becoming popular?
The industry is moving away from centralized data lakes because they scale cost, not value. Organizations want sovereignty, portability, predictable cloud spend, and detection outcomes that arenโt tied to storage expansion. Keeping logs in your cloud solves all four.

