Compliance Compass: EU Regulations for Software, SaaS, and Cloud Hosting
TL;DR The EU has established a coherent framework with GDPR, NIS‑2, DORA, CRA, Data Act, and the …
Diese Serie erklärt systematisch, wie moderne Software compliant entwickelt und betrieben wird – von EU-Regulierungen bis zur technischen Umsetzung.
“Privacy by Design” in the GDPR is not a marketing slogan but an architectural principle. The regulation is deliberately technology-neutral. It does not prescribe which software you must use but defines protection goals and leaves you the freedom to implement them technically in a meaningful way.
This is an opportunity: Those who design platforms and applications with privacy in mind today build more stable, secure, and often operationally efficient systems. Security standards, clean logging structures, precise data models for deletion and retention – all these are not only responses to regulatory requirements but also good engineering practice.
The following discusses three key GDPR articles – 32, 28, and 17 – and how to technically manage their requirements in a modern, cloud-native multi-tenant environment. We then look at EU data localization and its practical implementation at ayedo.
Article 32 (“Security of Processing”) requires “a level of security appropriate to the risk.” Since May 25, 2018, this has been the binding standard for anyone processing personal data. For cloud-native architectures, four key requirements can be derived from Article 32: Pseudonymization and encryption, ensuring confidentiality/integrity/availability, recovery, and continuous review.
Technically, it makes sense to assume a principle: Personal data is only stored or transmitted in plain text in exceptional cases.
Specifically, this means:
Data in Transit
All connections through which personal data flows are secured with modern protocols (e.g., current TLS versions, strong cipher suites). In service-oriented architectures, mTLS between services is now state of the art.
Data at Rest
Persistent storage (volumes, databases, object storage) is encrypted by default. Ideally, with central key management and a clear link between tenant and key material.
Pseudonymization in the Data Model
In many cases, it is sufficient to decouple direct identifiers:
Privacy by Design here means planning this decoupling in the data model and API design from the outset – not trying to “bolt it on” later.
Article 32 explicitly names these four aspects. For a cloud-native platform, they can be broken down into central technical patterns:
Confidentiality
Integrity
Availability and Resilience
In sum, this creates a technical security level that withstands an appropriate risk assessment while remaining operationally manageable.
Article 32 explicitly requires “regular testing, assessing, and evaluating” of measures. Practical components:
Security thus becomes an iterative process – not a one-time project.
Article 28 regulates the role of processors – typically your cloud or platform providers. Since the GDPR came into effect on May 25, 2018, it is clear: Technical measures and contractual arrangements must interlock.
Processors act solely according to documented instructions from the controller. From a technical perspective, it is important:
Transparency also includes complete information about subprocessors (e.g., hosting providers), their roles, and locations.
Cloud providers must document and keep their TOMs up to date. For you as the controller, the following are particularly relevant:
Good provider documentation allows your data protection officer to efficiently conduct DPIAs and risk analyses – without having to clarify every technical detail individually.
Article 28 explicitly obliges processors to assist controllers in fulfilling data subject rights. Technically, this means, among other things:
Those who take Privacy by Design seriously incorporate these requirements into APIs, data models, and logging structures from the start.
The right to erasure (“right to be forgotten”) is one of the most visible aspects of the GDPR. In distributed, multi-tenant architectures, the technical implementation is challenging but manageable if considered early.
The technical basis is a clear structure of data domains:
For deletion, the relationship between these domains and the affected person is relevant. Practically, this means:
The clearer these relationships are, the better a deletion request can be technically implemented.
In multi-tenant systems, two levels must be distinguished:
Logical Deletion in the Business Domain
Data is removed or anonymized so that no personal reference remains, while maintaining technical consistency and business history (as required).
Examples:
Physical Deletion in Infrastructure and Storage
In practice, organizations often implement deletions in two stages: Immediate logical deletion in production systems, physical deletion in backups after defined retention periods.
From the GDPR perspective, you must be able to prove that a deletion has occurred. Here, logging comes into play:
This allows you to provide concrete evidence to data subjects, auditors, and supervisory authorities without creating new data protection risks.
At the latest since the invalidation of “Safe Harbor” (2015) and “Privacy Shield” (2020), it is clear: Third-country transfers are legally volatile. EU data localization reduces this uncertainty.
Legal Certainty
Processing in EU/EEA data centers is subject to a consistent legal framework. Additional transfer mechanisms, standard contractual clauses, or complex Transfer Impact Assessments are often avoidable.
Simpler Architectural Decisions
If data does not leave the EU, complex geo-redundancy scenarios across legal jurisdictions with different governmental access rights are unnecessary.
Clarity for Your Customers
EU data localization is a decisive trust factor for many customers. It can be clearly and understandably communicated.
TL;DR The EU has established a coherent framework with GDPR, NIS‑2, DORA, CRA, Data Act, and the …
TL;DR The European regulatory landscape is intentionally interconnected: The GDPR forms the …
TL;DR NIS-2 expands the scope of EU cybersecurity regulation to 18 sectors, primarily involving …