What Is Bare Metal?
Bare metal refers to a physical server assigned exclusively to a single customer. The term "bare metal" is used to emphasise the absence of a virtualisation layer: your operating system runs directly on the hardware, without any intervening hypervisor or management software between your processes and the physical CPU, RAM, storage, and network interfaces.
When you provision a bare-metal server, you receive a machine that belongs entirely to you for the duration of your contract. No other customer's workload shares your processor cores. No other tenant's traffic competes with yours for memory bandwidth. The disk is yours. The network card is yours. The cryptographic random number generator is yours.
This matters for a reason that goes beyond performance. A physical server with a single operator has a fundamentally smaller attack surface than a virtualised environment. There is no hypervisor to exploit, no co-tenant to leak data from, and no management plane API through which a provider could image your running machine remotely. The only way to access a bare-metal server is through its operating system — which you control — or by physically touching the machine.
Providers such as Evolushost, operating entirely within the EU, have made instant bare-metal provisioning straightforward. What once required days of data centre coordination can now happen in minutes, eliminating the last practical argument for choosing cloud over dedicated hardware for stable workloads.
What Is Cloud Hosting?
Cloud hosting — as offered by AWS, Google Cloud Platform, Microsoft Azure, and their European equivalents — is built on virtualisation. A cloud provider purchases large numbers of powerful physical servers, installs a hypervisor on each one, and uses that hypervisor to carve the machine into dozens of virtual machines that are sold individually to different customers. From the customer's perspective, each virtual machine looks and behaves like an independent server. Behind the scenes, it is a software construct sharing hardware with neighbours it will never see.
The hypervisor — software such as KVM, Xen, or VMware ESXi — is responsible for isolating those virtual machines from one another. It allocates CPU time, schedules memory access, and enforces the boundaries between tenants. This is called multi-tenancy, and it is the economic foundation of cloud computing: by packing many customers onto each physical machine, cloud providers can offer compute at prices that would be impossible if they provisioned physical hardware per customer.
Cloud platforms add further layers on top of the hypervisor: management APIs, object storage systems, identity and access management, billing infrastructure, and monitoring pipelines. Each layer adds capability. Each layer also adds code, configuration, and people — and therefore expands the surface through which something could go wrong or through which data could be accessed without your explicit consent.
AWS operates under US law. GCP operates under US law. Azure, despite its European data centre presence, is a US company and therefore subject to the US CLOUD Act — meaning US authorities can compel Microsoft to hand over data stored on Azure's European infrastructure without requiring an EU court order.
The Privacy Problem with Cloud Hosting
The privacy risks of cloud hosting are not theoretical. They follow directly from how the technology works and from the legal frameworks that govern the companies operating it.
Hypervisor vulnerabilities. The hypervisor is a complex piece of software, and complex software contains bugs. VM escape vulnerabilities — flaws that allow code inside a virtual machine to break out and access the host or neighbouring VMs — are discovered regularly. The Spectre and Meltdown vulnerabilities, disclosed in 2018, demonstrated that fundamental CPU architectural features could be exploited to leak data across virtual machine boundaries. Processors from Intel, AMD, and ARM were all affected to varying degrees. Patches were issued, but the patches themselves introduced performance regressions, and new variants in the same vulnerability class continue to be discovered years later. Spectre v2, RetBleed, Downfall, and Inception are all descendants of the same root cause: modern processor optimisations that were never designed with multi-tenant security in mind.
Cloud provider data access. The cloud provider has administrative access to the physical hardware your virtual machine runs on. This is not a vulnerability — it is an intentional operational capability. Providers need this access to manage hardware, perform maintenance, migrate virtual machines between physical hosts, and respond to failures. But it also means the provider can, at any point, take a memory snapshot of your running VM, capturing whatever happens to be in RAM at that moment: encryption keys, session tokens, plaintext data in transit between your application's internal components. Under normal circumstances, a reputable cloud provider will not do this. Under a legal order, they may have no choice.
US jurisdiction even for EU data. The US CLOUD Act of 2018 requires US technology companies to provide US law enforcement with access to data they control, regardless of where that data is physically stored. This applies to AWS, Google Cloud, and Microsoft Azure even when serving EU customers through EU data centres. Storing your data on a server physically located in Frankfurt does not remove it from US legal reach if the server is operated by a US company. This is not a theoretical concern — it has been litigated extensively and the legal position is clear.
Side-channel attacks. Shared physical hardware enables a class of attacks that are impossible on dedicated servers. Cache-timing attacks, DRAM row-hammer attacks, and network timing correlations have all been demonstrated in research settings as methods for extracting information from co-located virtual machines. The feasibility of these attacks varies, but the point is that they exist as a category of risk that bare metal eliminates entirely by removing shared physical resources from the equation.
Performance: Bare Metal Consistently Wins
Setting privacy aside entirely, bare metal delivers better and more predictable performance than cloud virtual machines for most sustained workloads. The reasons are structural.
No virtualisation overhead. Running a hypervisor costs something. How much depends on the workload, but for CPU-intensive tasks — cryptographic operations, compression, database query processing — the overhead of a virtualisation layer is measurable. On bare metal, instructions execute directly on the processor. On a VM, the hypervisor must intercept certain privileged operations and translate them, adding latency that accumulates over billions of operations per second.
Direct hardware access. Bare-metal servers allow workloads to take advantage of hardware features that are difficult or impossible to expose through a virtualisation layer. NVMe storage accessed directly through its native protocol is faster than NVMe exposed through a virtual storage controller. Network interfaces with RDMA support perform better without a virtual network layer in the path. For database workloads in particular — where I/O latency dominates query performance — this difference can be significant.
Consistent I/O without noisy neighbours. On a shared physical host, a CPU-intensive or I/O-intensive workload running in a neighbouring VM can degrade your performance even if the hypervisor is doing its best to enforce resource limits. Cache pollution, memory bandwidth contention, and storage I/O queue saturation all leak across VM boundaries to some degree. On bare metal, the only workload competing for your hardware resources is your own.
For email infrastructure specifically, consistent latency matters. Message delivery, TLS handshakes, and IMAP session responsiveness all degrade under variable I/O performance. A dedicated server that delivers 95th-percentile latency within a tight band is worth more to an email service than a cloud VM with impressive average performance but occasional spikes when neighbouring tenants get busy.
The Cost Reality
Cloud appears cheaper at first glance. The entry price for a small virtual machine is low, billing is granular, and there is no upfront commitment. For organisations that are experimenting, scaling rapidly, or running highly variable workloads, these properties have real value.
But the comparison shifts as workloads mature. A virtual machine that runs continuously — as a mail server, a database, or any other always-on service — costs the same per hour whether it is busy or idle. When you sum up twelve months of cloud compute, network egress fees, storage costs, and the premium charged for reserved instances, the total often exceeds the cost of dedicated hardware that provides more consistent performance and stronger privacy guarantees.
The cost of compliance is also relevant. Organisations operating under GDPR, HIPAA, or ISO 27001 frameworks may need to conduct audits, maintain detailed records of data flows, and demonstrate that third-party infrastructure providers meet specific security standards. Each cloud provider adds a layer of compliance overhead. Bare-metal infrastructure with a single, clearly scoped provider simplifies this considerably — and simplicity in compliance documentation has real financial value.
Evolushost's instant bare-metal dedicated servers are priced to compete directly with equivalent cloud configurations, removing the historic premium that made cloud the default choice for cost-conscious teams. When the price difference disappears and the privacy and performance advantages of bare metal remain, the decision becomes straightforward.
Compliance: Bare Metal Makes Audits Simpler
Multi-tenancy creates compliance complexity. When your data lives on shared physical hardware managed by a third party, demonstrating control over that data to an auditor requires engaging with the third party's own compliance documentation, trust frameworks, and contractual commitments. This is manageable — cloud providers have invested heavily in compliance certifications — but it adds layers of indirection that dedicated infrastructure avoids entirely.
GDPR. The General Data Protection Regulation requires organisations to maintain detailed records of data processing activities and to be able to demonstrate that appropriate technical and organisational measures are in place. On shared cloud infrastructure, some of those measures are implemented at the hypervisor or platform level and are the cloud provider's responsibility to maintain and attest. On bare metal, the operator controls the full stack and can demonstrate compliance without depending on a third party's assurances.
HIPAA. Healthcare organisations handling protected health information must ensure that every entity that touches that data — including infrastructure providers — is operating under an appropriate Business Associate Agreement. Cloud providers offer BAAs, but those agreements cover only the infrastructure layer. The complexity of tracing data flows through multi-tenant infrastructure, demonstrating that encryption keys were never accessible to co-tenants, and auditing access logs across a shared environment is significantly greater than doing the same on a dedicated server.
ISO 27001. Information security management certification requires demonstrating that risks are identified, assessed, and mitigated. Shared tenancy is a risk. A hypervisor vulnerability is a risk. Cloud provider access to your virtual machine's memory is a risk. Each of these requires documentation, mitigation measures, and ongoing monitoring. Bare metal eliminates the multi-tenancy risks from the register entirely, reducing the scope of what must be audited and maintained.
When Cloud Is Still a Reasonable Choice
Cloud infrastructure is not always the wrong choice. There are workloads and use cases where its properties are genuinely advantageous.
Variable and unpredictable loads. If your traffic can spike ten times in an hour and then return to baseline, cloud's elastic scaling is valuable in a way that bare metal cannot match without significant overprovisioning. E-commerce platforms around major retail events, media sites responding to viral content, and applications with strong seasonal patterns all benefit from the ability to add and remove capacity rapidly.
Global content delivery. Cloud providers operate infrastructure in dozens of regions worldwide. If your application needs low-latency presence across multiple continents simultaneously, cloud's geographic footprint is difficult to replicate with dedicated hardware without a significant investment in multi-region infrastructure and the operational complexity that comes with it.
Serverless and event-driven workloads. Functions-as-a-service platforms — AWS Lambda, Google Cloud Functions, Azure Functions — are genuinely useful for workloads that run infrequently, briefly, and without requiring persistent state. A background job that runs once per hour for thirty seconds does not justify a dedicated server. For these workloads, the privacy trade-offs of cloud may be acceptable if the function does not handle sensitive data.
Non-sensitive development and testing. Development environments, CI/CD pipelines, and test infrastructure that does not handle production data are reasonable candidates for cloud hosting. The privacy argument for bare metal is strongest when applied to workloads that handle real user data — not to environments where synthetic or anonymised data is processed.
When Bare Metal Is Essential
For a specific and important set of workloads, bare metal is not a preference — it is a requirement. These are workloads where the privacy and performance guarantees of shared infrastructure are fundamentally insufficient.
Email servers. Email is one of the most privacy-sensitive workloads an organisation can run. Messages may contain confidential communications, legal correspondence, medical information, financial data, or journalistic sources. Running email on shared cloud infrastructure means that the cloud provider — and, through them, any jurisdiction with legal authority over that provider — has a theoretical path to your users' message content. Dedicated servers, operated by a European provider outside US jurisdiction, close that path. This is precisely why enemail chose bare metal over cloud: no hypervisor access, no US parent company, no second party in the data chain.
Databases storing personal data. Any database containing personal information subject to GDPR, HIPAA, or equivalent regulations is a candidate for bare-metal hosting. The ability to demonstrate that no other party has had access to the physical hardware on which the database operates simplifies compliance enormously and reduces the risk of a breach attributable to cloud infrastructure.
Encryption workloads. Cryptographic operations — key generation, signing, encryption, decryption — are maximally sensitive. Encryption keys in memory on a cloud VM are theoretically accessible to the hypervisor and therefore to the cloud provider. On bare metal, encryption keys in memory are accessible only through the operating system, which the operator controls exclusively. For certificate authorities, HSM-adjacent workloads, and any application that performs cryptographic operations on behalf of users, bare metal is the appropriate substrate.
Regulated industries. Finance, healthcare, legal, and government sectors often operate under regulatory frameworks that impose specific requirements on data residency, access controls, and audit trails. Bare metal makes it significantly easier to satisfy these requirements without depending on a cloud provider's interpretation of its own compliance commitments.
Conclusion: The Infrastructure Decision Is the Privacy Decision
The choice between bare metal and cloud is not primarily a technical decision about provisioning speed or billing models. It is a decision about who has access to your data, under what circumstances, and under whose legal jurisdiction. For most low-sensitivity workloads, cloud is a reasonable choice that delivers real operational benefits. For workloads that handle personal communications, sensitive personal data, cryptographic material, or regulated information, those trade-offs are unacceptable.
The privacy benefits of bare metal are not a marketing differentiator — they follow directly from the architecture. No hypervisor means no hypervisor-level attack surface. No shared physical hardware means no side-channel leakage between tenants. No US parent company means no CLOUD Act exposure. These are structural properties, not policies that can be changed by a vendor's terms of service update.
If you are building infrastructure for a privacy-sensitive workload and want to avoid the compromises that cloud multi-tenancy introduces, Evolushost's instant bare-metal dedicated servers offer European-jurisdiction hardware provisioned in minutes — combining the speed of cloud with the privacy guarantees of dedicated infrastructure. For teams that have historically chosen cloud out of convenience rather than conviction, the gap between bare metal and cloud has effectively closed.
And if you want to see what bare-metal infrastructure looks like in practice for a privacy-focused service, enemail is built on exactly this foundation: Evolushost dedicated servers in the EU, zero-knowledge encryption, and no third-party cloud provider in the data chain. The infrastructure choice is the privacy choice.
Private email on bare-metal EU infrastructure.
enemail runs on dedicated servers — not cloud VMs — for the same reason security professionals recommend bare metal for sensitive workloads. No shared hardware. No US jurisdiction. No compromise.
Create your free account