A Missile Can Take Down an Availability Zone. That's Enough.
Iranian drone strikes took down AWS availability zones in Dubai and Bahrain, forcing a global reassessment of data center siting.

A Shahed drone is not a sophisticated weapon. It is slow, loud, and cheap. On March 1, 2026, drone strikes hit Amazon Web Services facilities in the United Arab Emirates and Bahrain, taking down one availability zone in each of two regions simultaneously. The remaining AZs in both regions stayed operational. AWS directed customers to use other zones. The multi-AZ model did not collapse. It degraded.
That distinction matters, and it does not help as much as the cloud industry might hope.
A single-AZ outage in one region is a Tuesday. Correlated single-AZ outages across two sovereign regions, caused by the same military campaign on the same morning, is a structural finding. It means the threat model that underpins every multi-region availability architecture in the Gulf was wrong. Not about the blast radius of any individual weapon, but about the statistical independence of failures across regions when a state actor is the cause.
There is a sourcing distinction that practitioners should note. When the incidents began on March 1, AWS's own Service Health Dashboard described both as a "localized power issue" affecting mes1-az2 (Bahrain) and mec1-az2 (UAE). The dashboard made no reference to military strikes. Amazon confirmed separately, via blog post on March 2, that drone strikes had damaged facilities in the UAE and Bahrain. CNBC, Big Technology's Alex Kantrowitz, and The Register reported the strikes based on Amazon statements and government confirmations. The gap between AWS's operational language ("localized power issue") and its public acknowledgment of physical drone damage is itself a data point about how hyperscalers communicate infrastructure risk to their customers.
As of April 6, 2026, both AWS Service Health Dashboard feeds show no active incidents. The affected zones have recovered. The recovery took approximately five weeks. During that period, AWS internal communications reviewed by Big Technology's Alex Kantrowitz described zones as "hard down" with "no timeline for when DXB and BAH will return to normal operations." The company waived all usage fees in ME-CENTRAL-1 for March 2026. The AWS Service Health Dashboard for ME-SOUTH-1 also recorded Route 53 DNS propagation delays in the Bahrain region during this period, compounding service disruption beyond the struck zone itself.
The zones are back. The question they left behind are still pending.
What the drones hit
The physical facts of March 1 are narrow but consequential. Drone strikes hit AWS facilities in the UAE and Bahrain, knocking out a single availability zone in each region: mec1-az2 in ME-CENTRAL-1 (UAE) and mes1-az2 in ME-SOUTH-1 (Bahrain). The remaining availability zones in both regions continued to operate. AWS directed affected customers to use other AZs within the same regions. Amazon confirmed on March 2 that drone strikes had damaged facilities in the UAE and Bahrain. According to Amazon's March 2 statement, the Bahrain strike caused structural damage, disrupted power delivery, and in some cases required fire suppression activities that resulted in additional water damage. The AWS Service Health Dashboard for ME-SOUTH-1 (retrieved April 6, 2026) also recorded Route 53 DNS propagation delays in the Bahrain region, extending the impact beyond the directly affected zone.
The customer impact was immediate and broad. Abu Dhabi Commercial Bank, Emirates NBD, First Abu Dhabi Bank, payments platforms Hubpay and Alaan, Snowflake, and ride-hailing platform Careem all reported outages. Customers with workloads pinned to the affected AZs, rather than distributed across all three, bore the full disruption. AWS advised affected customers to migrate to alternative AZs or regions, stating that "a large number" had "already successfully operating" from other locations.
The multi-AZ assumption, tested
For a decade, the foundational architecture of cloud resilience has rested on availability zone separation. The premise: independent power, cooling, and networking across physically separated facilities within a metropolitan region means that no single failure can take down more than one zone. Applications architected across three AZs can survive the loss of any one facility.
On March 1, within each region, the multi-AZ model partially held. One AZ went down in ME-CENTRAL-1. One AZ went down in ME-SOUTH-1. The remaining zones in both regions continued to operate. Customers properly distributed across all three AZs in a single region experienced degraded service, not total outage. That is what the architecture is designed to deliver.
The architectural finding is not that multi-AZ failed within a region. It is that the same military campaign produced correlated AZ failures across two sovereign regions on the same morning. Multi-region redundancy assumes that the probability of simultaneous failure in Dubai and Bahrain is vanishingly small. That assumption was built for uncorrelated risks: an equipment failure in one region tells you nothing about equipment failure probability in another. A drone campaign launched by a state actor targeting a geographic theater violates that independence assumption entirely. The failures in mes1-az2 and mec1-az2 were not statistically independent. They had a common cause.
InfoQ's analysis of the incident noted that the strikes "challenged multi-AZ assumptions" by demonstrating that correlated failure modes are possible when the threat operates at a geographic scale larger than any individual zone or region. AZ separation is measured in kilometers. A drone campaign operates in hundreds of kilometers. Multi-region failover assumes uncorrelated risk between regions separated by hundreds of kilometers. A state actor's targeting decisions are correlated across every facility in the theater.
This is the physical forcing function. The redundancy model was not wrong about its design envelope. It was wrong about the threat model. Customers who architected for single-AZ failure within a region saw the design work as intended. Customers who assumed that "multi-region" in the Gulf meant geographically independent risk discovered that two regions within the same military theater are not independent at all.
The threat envelope expands
The strikes on AWS were not the end of the escalation. On March 31, the Islamic Revolutionary Guard Corps announced that 18 US technology companies are "legitimate military targets." The list: Microsoft, Google, Apple, Meta, NVIDIA, Intel, Cisco, Palantir, Tesla, Boeing, HP, IBM, Dell, Oracle, JPMorgan, GE, Spire Solutions, and UAE-based AI company G42.
The declared threat envelope now covers virtually every major hyperscaler and semiconductor company with Gulf region operations. The list represents Iran's public statement of intent, not a confirmed operational targeting order — but the distinction may matter less to infrastructure planners than the fact of the declaration itself.
Microsoft Azure operates UAE North and UAE Central regions, with a Saudi Arabia East region planned for Q4 2026. That Saudi deployment, a 200-megawatt data center expansion in partnership with G42, is the largest announced hyperscaler commitment in the Gulf since the conflict began. Microsoft has not disclosed whether the project will proceed on its original timeline.
Google Cloud operates or has planned regions in Qatar (Doha) and Saudi Arabia (Riyadh, Dammam). Google has not disclosed the operational status of its Gulf infrastructure or any changes to its regional expansion plans.
Neither Microsoft nor Google has confirmed physical strikes on any of their Middle East facilities. Neither has stated that their facilities are operating normally. The silence from both companies is notable. In an environment where AWS has been forced into public disclosure by the scale of its outages, the absence of any status communication from the other two major hyperscalers leaves their customers without the information needed to assess regional risk.
The sovereignty trap
The cruel irony of the strikes is that they were made possible, in part, by the very sovereignty mandates that the data center industry has spent years complying with.
Data localization requirements across the Gulf states mandate that certain government services and sensitive public sector data be physically hosted within national borders. These mandates exist to ensure digital sovereignty. They also concentrate high-value compute infrastructure in specific, identifiable physical locations within a conflict zone.
Gartner's February 2026 forecast projects worldwide sovereign cloud IaaS spending at $80 billion for the year, a 35.6% increase from 2025. The Middle East and Africa region shows the highest projected growth rate at 89%. That growth is driven precisely by the sovereignty pressures that the Iranian strikes have now weaponized.
The legal dimension compounds the trap. If regional courts in Dubai and Abu Dhabi were to view data center disruption in an active conflict zone as a foreseeable risk, force majeure protections for cloud operators could be significantly limited. Klaudia Klonowska, postdoctoral researcher at Sciences Po Paris, and Michael N. Schmitt, professor of public international law at the University of Reading and the scholar who led the Tallinn Manual process, argued in Just Security on March 12, 2026, that data centers could qualify as lawful military targets under Article 52(2) of Additional Protocol I, but only if demonstrably supporting military operations at the time of the strike. Their core finding: it is "impossible to render a definitive judgment" without knowing whether the facilities actually hosted military workloads, and Iran likely attacked based on potential rather than confirmed military use, which may violate the distinction principle. No court or tribunal has yet tested this framework against the deliberate targeting of civilian cloud infrastructure. The legal resolution will likely take years.
The structural consequence is a bind that has no clean resolution. Sovereignty mandates push infrastructure into national borders. Kinetic threats punish geographic concentration. The two forces pull in opposite directions, and the infrastructure industry is caught between them.
The new construction calculus
For operators planning new facilities, the calculus has changed in two dimensions: cost and architecture.
On cost: a security premium is emerging for new construction in conflict-adjacent regions. Physical hardening, anti-drone detection and mitigation systems, independent resilient power sources, and military-grade perimeter security are becoming line items in data center construction budgets that previously accounted only for environmental and equipment risks. The premium is real, even if its precise magnitude is still being priced by the market.
IDC's March 2026 revision of its global IT spending outlook tells part of the story. The firm cut its 2026 growth forecast from 6.8% to 4.5% post-conflict, reflecting widespread postponement of technology investments. That is a macro signal, not a construction-specific figure. But it captures the sentiment shift: capital that was flowing into Gulf region compute is now pausing to reassess.
On architecture: the emerging response is a two-tier model. The first tier consists of hardened "bunker" data centers in physically protected locations, designed for critical government, defense, and sovereign AI workloads. The second tier distributes commercial applications across smaller, geographically dispersed edge facilities where the loss of any single site does not constitute a regional failure.
This is the greenfield answer. For brownfield, the existing Gulf data center fleet faces a different problem. Retrofitting physical hardening into facilities designed for commercial operations is expensive and operationally disruptive. The operators who built in the Gulf during the 2021-2024 expansion boom, when the region was a primary target for hyperscale growth driven by sovereign AI ambitions and massive capital availability, now face a repricing of assets that were not designed for the threat environment they inhabit.
The insurance gap
One dimension of the new calculus remains almost entirely opaque: insurance.
No insurance industry disclosure has appeared on whether existing data center policies cover kinetic military action. Standard property insurance policies typically exclude acts of war. CNBC reported on April 3, 2026, that insurance brokers are creating "specialized teams and bespoke policies" for data center operators in the region. The creation of bespoke policies implies that standard coverage does not apply. Marsh's February 2026 report on digital infrastructure risk in the Middle East references the need for "bespoke policies" and "specialized teams," which is broker language for a coverage gap that existing products do not fill.
For practitioners evaluating Gulf region deployments, this is a material gap. The total cost of ownership for a data center in a conflict zone is not calculable without knowing whether the facility is insurable against the specific risk that has already materialized.
What to watch
AWS post-recovery durability. Both ME-CENTRAL-1 and ME-SOUTH-1 show no active incidents on the AWS Service Health Dashboard as of April 6, 2026 (retrieval date). The affected zones (mec1-az2 and mes1-az2) have recovered after approximately five weeks of outage. The watch item has shifted: if either region suffers a subsequent AZ outage from continued military activity before the end of Q2 2026, it will test whether the recovery was a rebuild to prior resilience or a temporary restoration that cannot absorb a second strike. The five-week recovery window is itself a benchmark. Any future kinetic event at a hyperscale facility will be measured against it.
Microsoft Saudi Arabia East. If Microsoft does not confirm the launch of its Saudi Arabia East Azure region on its original Q4 2026 timeline, the IRGC threat will have achieved deterrence against new hyperscaler deployments in the Gulf without firing a shot at Microsoft infrastructure. The 200 MW G42 partnership is the test case for whether the threat environment has frozen new investment or merely repriced it.
Gartner sovereign cloud forecast revision. Gartner's $80 billion sovereign cloud IaaS forecast for 2026 was published on February 9, before the IRGC's April 1 expansion of threats to 18 companies. If the figure is revised downward in the next quarterly update (expected Q2 or Q3 2026), kinetic risk will have overcome sovereignty mandates as the primary driver of cloud infrastructure siting, reversing a multi-year trend. The Middle East and Africa growth rate (89%) is the specific line item to track.
The bottom line
The data center industry spent a decade optimizing for latency, sovereignty compliance, and proximity to capital. It optimized for everything except the possibility that someone would fly a drone into the building.
That possibility is now a confirmed operational reality. Two AWS availability zones were taken down by drone strikes on the same morning. The affected zones have since recovered, after approximately five weeks offline. Eighteen US technology companies have been declared military targets by a state actor currently engaged in active combat operations. And the legal, insurance, and architectural frameworks that the industry relies on were built for a threat model that no longer describes the world.
The five-week recovery is not reassurance. It is a measurement. It tells every infrastructure planner in the world exactly how long a hyperscale AZ stays down when a drone gets through. It tells every customer with single-AZ-pinned workloads how long their applications stay offline. And it tells every military planner how much disruption a cheap, slow, unsophisticated weapon can buy.
The sovereign cloud market is not going to shrink. The $80 billion in projected 2026 spending reflects genuine national imperatives that do not disappear because the risk calculus has changed. But the where and how of that spending is being rewritten in real time. Physical survivability is now a first-order infrastructure requirement, not a line item in a risk register. The operators and nations that internalize this fastest will build the compute infrastructure that endures. The ones that treat March 1 as an anomaly will build the infrastructure that doesn't.
---
*Primary source data: AWS Service Health Dashboard RSS feeds for ME-SOUTH-1 (https://status.aws.amazon.com/rss/multipleservices-me-south-1.rss) and ME-CENTRAL-1 (https://status.aws.amazon.com/rss/multipleservices-me-central-1.rss), retrieved April 6, 2026.*
---
Tags: Data Center Security, Sovereign Cloud, AWS, Middle East, Iran Conflict, Cloud Infrastructure, Geopolitical Risk, Data Localization, Multi-AZ Architecture, Critical Infrastructure, Physical Security
🤖 AI Disclosure
AI-assisted research and first draft. This article has been verified by a human editor.