Accelerating MedTech Innovations: Compliance-Ready from the First Line of Code
For MedTech companies and developers of Digital Health Applications (DiGAs), the path to market is …

Few topics are currently causing as much turmoil in IT as new regulatory requirements. GDPR, NIS-2, DORA, Cyber Resilience Act, or Data Act expand the framework within which digital systems must operate. For many companies, this development initially seems like an additional burden. New documentation requirements, additional audits, new processes—all of this seems to hinder innovation.
But this perspective is too short-sighted.
Regulation is not just an administrative problem. It is primarily an architectural challenge. Viewing compliance as a downstream audit process inevitably creates bureaucracy. However, when compliance is considered as part of the system architecture, many requirements can be technically resolved—often more elegantly than with traditional governance processes.
The difference between these two approaches determines whether regulation becomes a perpetual construction site or a structural advantage.
In many organizations, compliance still follows a familiar pattern. Systems are developed, platforms are built, applications are integrated. Only when an audit is imminent or regulatory pressure arises does the actual processing begin.
Documentation is created retrospectively. Responsibilities are reconstructed. Configurations are manually checked. Logs are gathered. Screenshots serve as proof that certain settings exist.
This process is laborious, error-prone, and rarely sustainable. Any change in the infrastructure can lead to outdated documentation or invalid evidence. With each new audit, the same search for evidence begins anew.
This approach has little to do with modern IT. It is an attempt to control dynamic systems with static documentation methods.
Modern platforms function differently. Applications are continuously developed, deployments are automated, infrastructure is described through code. Containers, microservices, and CI/CD pipelines ensure that systems are constantly changing.
In such an environment, it is hardly possible to ensure compliance solely through manual processes. The speed of modern software development directly collides with traditional audit methods.
Therefore, compliance is increasingly becoming a technical issue. Systems must be built so that traceability, security, and control are integral properties of the architecture—not subsequent additions.
This is where the approach of Compliance-by-Design begins.
Compliance-by-Design shifts the focus from documentation to system architecture. Instead of retrospectively checking security and governance requirements, they are directly integrated into platform components.
Configurations are versioned. Access rights are defined declaratively. Infrastructure changes run through controlled pipelines. Security policies are automatically checked.
The result is an environment where compliance is no longer primarily demonstrated through documents, but through the state of the infrastructure itself.
Logs are generated automatically. Changes are traceable. Configurations can be reproduced at any time. Auditors no longer have to reconstruct how a system works—they can directly verify it.
Compliance thus becomes measurable.
Technologically, this approach is usually based on two principles: Infrastructure as Code and GitOps.
Infrastructure as Code describes infrastructure not through manual configuration, but through declarative definitions. Networks, policies, deployments, or security rules are recorded and versioned in code form. Changes are made in a controlled manner via pull requests and reviews.
GitOps extends this principle to the entire platform operation. The desired state of a system is defined in a repository. Automated processes ensure that this state is continuously reconciled with the actual infrastructure.
These mechanisms create a seamless history of changes. Every adjustment is documented, traceable, and reproducible. These exact properties are crucial for regulatory requirements.
Compliance thus becomes a byproduct of clean architecture.
A key advantage of this approach lies in the generation of evidence. When systems are consistently operated based on observability, large amounts of structured operational data are generated.
Logs document accesses and events. Metrics show system states. Audit trails capture changes to infrastructure and configurations.
These data can be automatically evaluated and exported. Instead of manually creating screenshots or configuration lists, companies can generate auditor-relevant information directly from the infrastructure.
The auditor sees not just a snapshot, but a complete history.
This also changes the relationship between operation and auditing. Audits no longer become an exceptional state, but a continuously verifiable process.
The current regulatory development in Europe reinforces this trend. New frameworks demand not only more documentation but also stronger technical traceability.
NIS-2 requires robust security processes. DORA demands demonstrable resilience in digital infrastructures. The Cyber Resilience Act expands security requirements along the entire software supply chain. The Data Act calls for clear rules for data portability and exit strategies.
All these requirements can hardly be fulfilled in the long term with purely organizational measures. They deeply affect architectural decisions.
Those who take these requirements seriously must design infrastructure so that security, portability, and traceability become technical properties of the system.
The choice of infrastructure also plays an important role in this context. Compliance requirements are easier to meet when platforms are operated transparently and have clearly defined responsibilities.
European providers like Hetzner, IONOS, OVHcloud, Scaleway, or STACKIT offer a different starting point than global platform ecosystems, whose governance structures often lie outside the European legal framework.
Especially Hetzner becomes an important building block in many cloud-native platform architectures. The combination of European infrastructure, clear technical architecture, and high integration capability with open platform technologies makes the provider attractive for many compliance-sensitive workloads.
In conjunction with Kubernetes-based platforms, environments can be built where infrastructure, data storage, and operational processes run under clearly defined control conditions.
Compliance is thus secured not only organizationally but also infrastructurally.
Many companies still view compliance as a cost factor. Documentation, audits, and security processes appear as an additional burden for development teams and platform operators.
In the long run, however, the opposite can be true.
Organizations that consistently build their infrastructure according to principles like Infrastructure as Code, GitOps, Observability, and Zero-Trust-Security create an environment where compliance does not have to be constantly retroactively established. It is already part of the system.
These companies respond more quickly to regulatory changes, pass audits with significantly less effort, and simultaneously maintain control over their platform architecture.
Compliance thus becomes a structural advantage rather than an administrative problem.
The real challenge, therefore, does not lie in the regulation itself. The challenge lies in how organizations respond to it.
Those who continue to treat compliance as a downstream documentation obligation will repeatedly find themselves in hectic audit preparations. However, those who think of architecture, operation, and governance together can automate many requirements.
Modern platforms are already capable of technically mapping security, traceability, and control. Companies just need to consistently utilize these possibilities.
Compliance-by-Design is therefore not an additional process. It is a question of architecture.
And that is why the future of regulatory IT is not decided in the audit room—but in the design of modern infrastructure.
For MedTech companies and developers of Digital Health Applications (DiGAs), the path to market is …
Editorial This week, Europe once again loudly proclaimed ‘Digital Sovereignty!’—only to …
Delos Cloud vs. Stackit Workspace – Wolves in Sheep’s Clothing The discussion around digital …