A Linux Foundation Project
Sovereign Silicon

The Architecture
Sovereign AI Demands

Defense programs, national AI compute initiatives, and regulated critical infrastructure all carry the same hard requirements: fully auditable hardware, unambiguous jurisdiction, a neutral licensor that does not compete with its customers, and enterprise software that runs on day one. POWER is purpose-built to meet every one of them.

🔍
Fully Auditable ISA Every instruction documented. No proprietary firmware layers. No hidden execution contexts at any privilege level.
🏛️
Clean Jurisdiction & Provenance US-origin ISA, Linux Foundation governed, fabricable at US trusted domestic fabs — clear provenance at every layer.
⚖️
Permanently Neutral OpenPOWER Foundation does not manufacture chips. Your ISA licensor will never become your competitor.
🖥️
Enterprise Software, Day One 30 years of RHEL, OpenShift, OpenJDK, PostgreSQL — the full enterprise stack certified and ready on any compliant POWER chip. Existing binaries run immediately.
The Standard

What Sovereign AI Programs Actually Require

Defense procurement, national AI programs, and regulated critical infrastructure operate under specific compliance frameworks. The hardware has to clear each of these — not as a preference, but as a non-negotiable procurement criterion.

REQ 01

Hardware Auditability

Every instruction, every execution path, every privilege level must be documented and verifiable. Proprietary firmware running at ring −3 — below the OS, below the hypervisor — cannot be present in mission-critical deployments. Classified AI inference requires a clean, fully verifiable compute base.

CMMC L3+ CNSA 2.0 TEMPEST
REQ 02

Supply Chain Provenance

Hardware must have clear, documented provenance from ISA through fabrication. Supply chain concentration risk — including single-country fab dependency — must be assessed and mitigated. Domestic trusted fabrication capability is increasingly a hard procurement requirement, not a preference.

NDAA §5949 CMMC NIS2
REQ 03

Jurisdiction Clarity

The ISA, its governance, and its fabrication must have unambiguous national jurisdiction. Hardware used in compartmentalized programs cannot carry uncertain provenance across multiple jurisdictions. The origin of every layer of the stack must be clean and documentable.

ITAR Five Eyes TCSEC
REQ 04

ISA License Stability

Critical infrastructure and regulated programs cannot accept single-vendor ISA dependencies where a private corporation can unilaterally modify or terminate license access. DORA Article 28 explicitly requires firms to assess and contractually mitigate this class of single-vendor technology dependency.

DORA Art. 28 NIS2 EU Chips Act
REQ 05

Neutral, Non-Competing Licensor

When an ISA licensor manufactures and sells chips, it creates a structural conflict of interest with every system integrator that builds on that ISA. Defense procurement rules require this conflict to be documented and mitigated. For national programs, it undermines the entire point of sovereign silicon.

DoD Procurement FAR/DFARS Digital Sovereignty
REQ 06

Enterprise Software Continuity

Sovereign compute programs cannot require rewriting the enterprise software stack. Hardware must support existing operating systems, middleware, databases, and AI frameworks without per-implementation negotiation. Software fragmentation across implementations is an operational and compliance risk sovereign programs cannot accept.

FIPS 140-3 Common Criteria FedRAMP
30+
Years of enterprise-class deployment in mission-critical environments
EAL4+
Common Criteria certification precedent on OpenPOWER systems
RAD750
Radiation-hardened POWER heritage — Mars rovers, JWST, Curiosity
3
US-domiciled trusted fab options — GlobalFoundries, Intel Foundry, TSMC AZ
The POWER Answer

How POWER Meets Every Requirement

POWER was not adapted for sovereign compute — it was built for the environments where these requirements originated. Thirty years of IBM mainframe and government deployment is the evidence base.

Fully Documented ISA — No Hidden Layers

Every POWER instruction is publicly documented. There is no mandatory proprietary firmware equivalent running at a privileged level below OS visibility. Clean-room implementations can account for every execution path — a hard requirement for classified and CNSA 2.0-compliant deployments.

Meets REQ 01 · CMMC L3+ · CNSA 2.0 · TEMPEST

US-Origin with Domestic Fab Availability

IBM-origin ISA, governed by the Linux Foundation. ESI silicon is fabricable at GlobalFoundries (CHIPS Act-funded), Intel Foundry Services (Arizona, Oregon), and TSMC Fab 21 (Arizona) — all DoD-approved trusted fabrication sources with no single country dependency.

Meets REQ 02 · NDAA §5949 · CMMC · NIS2

Unambiguous Jurisdiction at Every Layer

The POWER ISA and its governance have a single, clear national jurisdiction with no secondary exposure through joint ventures or foreign ownership structures. Every layer of the stack — ISA, governance, fabrication — is documentable for compartmentalized program requirements.

Meets REQ 03 · ITAR · Five Eyes · TCSEC

Open ISA — No Single-Vendor License Risk

The POWER ISA is governed by OpenPOWER Foundation under Linux Foundation stewardship. No single company can unilaterally modify license terms or terminate access. The Open Silicon Program is bringing community cores to full ISA compliance, eliminating proprietary licensing entirely.

Meets REQ 04 · DORA Art. 28 · NIS2 · EU Chips Act

Permanently Neutral — We Don't Compete With You

OpenPOWER Foundation is a member-governed nonprofit. It does not design, manufacture, or sell chips. The ISA licensor and the chip manufacturers are structurally separated — permanently. OpenPOWER's governance model ensures this neutrality cannot be changed by any single member, now or in the future.

Meets REQ 05 · DoD Procurement · FAR/DFARS

30 Years of Software — No Replatforming Required

Design a chip to POWER ISA compliance and the full enterprise stack runs on it: RHEL, SUSE, Ubuntu, OpenJDK, OpenShift, PostgreSQL, WebSphere, IBM i. No per-implementation negotiation. No fragmentation. Compliant means compatible — across every implementation, without exception.

Meets REQ 06 · FIPS 140-3 · Common Criteria · FedRAMP
Where POWER Wins

The Markets That Require It

These sectors don't just prefer sovereign compute — they are required by law, regulation, or national policy to procure it. POWER is built for the stack of requirements they carry.

🛡️

Defense & Intelligence

Classified AI inference and edge compute for DoD, NSA, and allied defense programs. Fully auditable hardware, trusted domestic fabrication, and clean jurisdiction are mandatory. POWER's RAD750 heritage — deployed on Mars rovers and JWST — gives it a mission-critical track record that speaks for itself.

CMMC L3+ ITAR CNSA 2.0 TEMPEST
🌐

National AI Compute Programs

Sovereign wealth and government programs building AI compute independence need an open ISA no single corporation controls and that any licensed party can implement. POWER's open governance, mature software stack, and US-origin clean provenance make it the natural choice.

EU Chips Act Digital Sovereignty Data Residency
📡

Sovereign Telecom / Open RAN

National telcos eliminating proprietary baseband dependencies need open-ISA compute for Open RAN deployments. A POWER chiplet with UCIe-attached DSP/ML accelerator is purpose-built for this workload — open governance, supply chain independence, NIS2-compliant provenance.

NIS2 DORA O-RAN Alliance
🛰️

Space & Satellite Edge AI

Onboard AI inference for next-generation satellites requires radiation-tolerant, auditable, long-lifecycle compute. POWER derivatives have flown on missions since 1998 — Mars rovers, JWST, Curiosity. That heritage translates directly into supply chain discipline, long-lifecycle support commitments, and the reliability evidence space programs demand.

Rad-tolerant Long lifecycle Provenance
🏦

Regulated Financial Infrastructure

Central banks, clearinghouses, and systemically important financial institutions running AI for fraud, risk, and settlement need hardware provenance they can document for regulators. DORA Article 28 requires it. POWER delivers a 30-year compliance track record and ISA governance no single institution can change.

DORA FIPS 140-3 Common Criteria
🏥

Healthcare AI (HIPAA / GDPR)

Patient AI inference — radiology, pathology, drug interaction — must stay within national jurisdictions. GDPR Article 25 requires privacy by design at the hardware level. Open, auditable silicon with documented provenance is increasingly a procurement requirement, not a preference, for national health systems.

HIPAA GDPR Art. 25 NIS2
Software Continuity

Your Existing Software Runs on POWER

Moving to sovereign compute should not require rewriting your software stack. POWER's binary compatibility layer lets organizations validate existing workloads immediately — so procurement teams can confirm software continuity before committing to a migration, not after.

Migration is a config change, not a rewrite.

The POWER Compatibility Layer (PCL) — built on Box64 and QEMU user-mode — runs existing Linux binaries natively on POWER today. No source code required. No recompile. No migration project. Enterprise workloads can be validated on POWER with a single package install.

As organizations progressively recompile to native POWER — which delivers full performance and efficiency — they gain access to the complete enterprise software stack: RHEL, Ubuntu, OpenShift, OpenJDK, PostgreSQL, all natively compiled and certified on POWER for 30 years.

"Sovereignty should not require starting over. POWER gives you the hardware provenance regulators require and the software continuity operations demand — at the same time."
  1. 1
    POWER Compatibility Layer (PCL) OPF-maintained Box64 + QEMU stack, packaged for RHEL, Ubuntu, and Fedora. One command — dnf install power-compat — makes existing Linux binaries run on POWER immediately. No source code. No recompile.
  2. 2
    Software Compatibility Working Group A formal OPF working group for ISVs and integrators to validate software on POWER, file compatibility reports, and receive OPF support — enabling parallel qualification without disrupting existing deployments.
  3. 3
    "Certified on POWER" Program OPF-issued certification for software validated to run on POWER — giving procurement teams a public compatibility registry and ISVs a sovereign-market certification to lead with.
  4. 4
    Native Recompile — Full Performance Once validated through PCL, recompiling to native POWER removes the emulation layer and delivers full hardware performance. The POWER toolchain (GCC, LLVM, OpenJDK) handles standard workloads with no additional porting effort.

Ready to Evaluate POWER for Your Sovereign AI Program?

Whether you're a defense system integrator, a national AI program procurement team, or an organization evaluating sovereign compute options — the conversation starts here.