I'm sure if it was a high enough profile target, it being in another country wouldn't stop anyone. Any real intelligence agency has spies in all countries and will just send someone to steal the drives or data, with complete plausible deniability. Of course, for Joe bloggs and his website, totally not worth it...
No need for force, they'll just call the local authorities, and tell them they want it because of... terror, or some other reason. After all,
we're all amigos who help each other. So the local equivalent of a Homeland agent would knock at the datacenter which has "secure" and "biometric access control" prominently in its advertizing material, and demand the geek-on-duty to put his thumb on the door scanner. Geek-on-duty will of course do it because he doesn't want more Homeland-equivalent attention than absolutely necessary on his person.
Then the agent will just pull out your server, and the one above and below it as well, to be sure. The hoster will replace the servers that had hardware failure within 24 hours, as per the service level agreement.
Aye it's the only thing where i concede you can't have 100% security
You can't have 100% security otherwise either. Especially I'm convinced that you can't have what you described earlier.
I had been thinking about whether it was possible and worthwhile to do such a SaaS thingie as you described a month or two ago when this Thai hoster started a topic on here and suggested that Thailand was basically an "empty" market. It seemed tempting to take advantage of that. However, having had one or the other real life experience with south-east Asia in the past, my estimate was that chances were someone will just steal and rebrand (or even steal and resell without rebranding!) anything of value. I've had this happen with humanitarian aids, entire containers just gone, they "never arrived" at the harbour, and suitcases full of medical supplies that I had hauled over in my private suitcase which "disappeared" over night from the hospital's storage room. If people obviously aren't afraid that people will die when they steal stuff, why would they worry stealing software. Add to that a military regime which is not precisely the most stable environment overall (and which I have a little experience with, too).
All in all, my consideration was that putting anything marginally valuable on a server in such a location was
unwise, unless it was reasonably secured (against theft, first and foremost).
So how would you mitigate risk in that situation? Assume that "data" (like player levels or highscores) is indeed not very valuable, but the software, which you sell as service, is. That is, if I understood your earlier post correctly, exactly your premise.
How do you prevent someone from cloning the disk and using a hex editor to change the company name and payment details, and booting the disk in another server next door? You don't.
Encryption doesn't help because the disk must be decryptable or the software will not run. For that, the key must be on the server (which is as good as no encryption), or it must be pulled from a trusted server on the network (located in a place that you control).
Except there is no such thing as a trusted server if the client and the network cannot be trusted (well, the server is trusted, it just doesn't mean anything for the net result). Someone cloning the disk will have your private SSL keys (otherwise the server/client couldn't connect to the trusted server), so you cannot ever be sure you talk to the "genuine" server or to a proxy or to a completely different one. Anyone can download the decryption keys any time they need them. You could as well store the decryption key on the server right away. No, you cannot manually log into the system from your end to provide a key either (well you can, but it's the same situation). Yeah, you could use one-time-pads for authentication. Unluckily, anyone stealing your disk will also have the OTP...
Obviously, the only secure approach is that the software is never saved to disk. I will ignore cold boot attacks since they're a somewhat ridiculous approach for pirating software (it may work for a single bitlocker key, but for several megabytes of executable...?), even more so in a country where the average room temperature is 30°C. But for the sake of it, let's assume you even encrypt/decrypt modules on the fly in memory.
So.. what isn't stored on the disk cannot be stolen, sounds great.
Still, the software must come from
somewhere. So you must download it from the network. Back to step #1.