Alerting & Incident Response: From Anomaly to Final Report
TL;DR Effective alerting is more than just a few emails at 80% CPU: It requires clean metrics, clear …
Diese Serie erklärt systematisch, wie moderne Software compliant entwickelt und betrieben wird – von EU-Regulierungen bis zur technischen Umsetzung.
The European regulatory landscape has become significantly denser in recent years. This is no coincidence but an expression of a clear political goal: Europe wants to be not just a consumer but an independent player in the digital space. This includes reliable data protection, robust infrastructures, fair competition conditions, and a minimum level of technological independence.
For you as a responsible person for software, SaaS, or cloud hosting, this means: Compliance is no longer just a topic for legal departments. Architecture, operating models, supplier selection, and product strategy are directly affected.
The good news: The six central regulations are not an unmanageable patchwork. Many requirements interlock and can be addressed with a consistent technical and organizational approach. This is where a conceptual “Compliance Compass” helps.
The GDPR has been applicable since 25.05.2018 and forms the basis of almost all other EU regulations in the digital space. It addresses:
Practical implications for software and SaaS operators:
GDPR is thus the foundation on which NIS‑2, DORA, CRA, Data Act, and the Cloud Sovereignty Framework build.
The NIS‑2 directive came into force on 16.01.2023 and must be transposed into national law by 17.10.2024. It targets operators of essential and important entities in 18 sectors (e.g., energy, health, digital infrastructure, cloud computing).
Core requirements:
For cloud and SaaS operators, this means two things: They may fall directly under NIS‑2 or be factually obligated by their customers as critical service providers. In both cases, demonstrable processes, metrics, and technical protective measures are required.
The Digital Operational Resilience Act (DORA) has been in force since 16.01.2023 and will apply directly from 17.01.2025. It affects financial institutions (banks, insurers, payment service providers, etc.) and their ICT service providers.
DORA builds on NIS‑2 but goes significantly further in the financial sector:
If you provide services for financial companies, DORA will shape your architecture and operational decisions – even if you are not directly regulated. Multi-region strategies, exit concepts, and testable emergency processes become hard requirements, not “best practices.”
The Cyber Resilience Act (CRA) came into force in spring 2024. After a transition period of approximately 36 months, it will be applicable from 2027. It targets manufacturers and providers of connected software and hardware products.
Key elements:
For software and SaaS providers, this means: Security requirements are no longer just contractual “goodwill” but legally anchored product features. Build pipelines, release processes, and dependency management must be aligned accordingly.
The Data Act came into force on 11.01.2024 and applies from 12.09.2025. It pursues two goals:
Relevant requirements for cloud and SaaS operators:
Thus, exit capability – the ability to move an application and its data to another environment – becomes a regulated feature. Architectural decisions regarding data formats, API design, multi-tenancy, and automation are directly affected.
The EU Commission’s Cloud Sovereignty Framework is not a law but a procurement framework that has been used and further developed since 2022. It evaluates cloud services along several sovereignty goals (SOV-1 to SOV-8), e.g.:
Public clients, but increasingly also regulated companies, use this framework to select suitable providers and operating models. For operators of platforms and SaaS solutions, it becomes a strategic sales argument to demonstrably meet the criteria of the Cloud Sovereignty Framework.
Across all six regulations, three guiding principles can be identified that reinforce each other.
For your architecture, this means: You should consciously decide where data is stored, how it is processed, and how you limit dependencies on individual providers. Multi-cloud or “dual-vendor” strategies, standardized interfaces, and clear data classification become an important part of governance.
The common picture: Security is no longer an add-on but a cross-cutting requirement across design, development, operation, and supply chain. For you, this means:
The result is a clear trend towards open standards, transparent APIs, and portable applications. For cloud-native software, this is a great opportunity: Those who focus on containerization, open protocols, and standardized platforms in design are automatically better prepared for these requirements.
Instead of seeing six separate construction sites, it is worthwhile to leverage the overlaps.
The GDPR provides the basis with Privacy by Design, data minimization, and security requirements:
Those who are well-positioned here have already completed a significant part of the “homework” for further regulations.
The difference: DORA sharpens these requirements for the financial sector and explicitly includes ICT service providers. For you, it may be sensible to take the stricter DORA requirements as a reference – even if you are not in the financial sector. This creates a future-proof standard that NIS‑2 aligns with.
TL;DR Effective alerting is more than just a few emails at 80% CPU: It requires clean metrics, clear …
TL;DR NIS-2 expands the scope of EU cybersecurity regulation to 18 sectors, primarily involving …
TL;DR The GDPR has required since May 25, 2018, that personal data be protected according to the …