Scalefield Hosting powered by CYBERTEC
Compliance

Compliance Engineered In, Not Bolted On

From DORA to GDPR, every compliance requirement is addressed at the infrastructure level. Audit-ready from day one, with automated reporting and continuous monitoring.

DORA

DORA-Ready Database Infrastructure

The Digital Operational Resilience Act requires financial entities to demonstrate ICT resilience. Here is how CYBERTEC Scalefield Hosting maps to each pillar.

ICT Risk Management

Art. 5–16
  • Automated risk assessment and continuous monitoring
  • Documented risk management framework
  • Regular vulnerability scanning and patching
  • Asset inventory and classification
  • Risk-based access control policies

ICT Incident Management

Art. 17–23
  • Real-time incident detection via AI monitoring
  • Automated incident classification (critical/major/minor)
  • Regulatory reporting templates (72-hour window)
  • Root cause analysis tooling
  • Incident response playbooks and automation

Resilience Testing

Art. 24–27
  • Automated failover testing and drill reports
  • Chaos engineering integration capabilities
  • Backup restoration verification
  • Performance stress testing
  • Annual resilience assessment reports

Third-Party Risk

Art. 28–44
  • European-only supply chain — no extra-European dependencies
  • Auditable vendor relationships and sub-processor list
  • Exit strategy documentation and data portability
  • Concentration risk assessment
  • Contractual resilience requirements for all suppliers

Information Sharing

Art. 45
  • Anonymised threat intelligence within customer community
  • Security advisory notifications
  • Vulnerability disclosure process
  • Shared incident learnings (anonymised)

DORA Compliance Report

On-demand

Generate comprehensive DORA compliance reports covering all five pillars. Export-ready for regulatory submissions and internal audits.

Request Sample Report
AI-Powered Incident Response Timeline

Automated incident detection and resolution powered by AI — mean time to resolution under 12 seconds

GDPR

GDPR Compliance by Design

As a European company operating exclusively within European jurisdiction, GDPR compliance is fundamental to our architecture — not an afterthought.

Data Processing Agreement

Comprehensive DPA included with every hosting contract. GDPR Art. 28 compliant.

Data Residency Guarantee

All data stored and processed exclusively within EU/EEA/CH data centres. No exceptions.

Right to Erasure

Technical implementation of data deletion workflows. Verifiable and auditable.

Data Portability

Full database export in standard formats at any time. No lock-in, no barriers.

Privacy by Default

Encryption, access controls, and audit logging enabled by default on every deployment.

Sub-Processor Transparency

Complete transparency over every sub-processor involved in your data processing. All sub-processors are European companies operating within European jurisdiction.

Data Centre ProviderEurope
Network ProviderEurope
Backup StorageEurope
Monitoring InfrastructureEurope

Full sub-processor list available upon request. Customers are notified 30 days before any sub-processor change.

European Data Sovereignty Infrastructure

All data centres operated exclusively within EU/EEA/CH jurisdiction

NIS2

NIS2 Directive Compliance

The Network and Information Security Directive (NIS2) expands cybersecurity obligations to essential and important entities across the EU.

Risk Management

Comprehensive cybersecurity risk management measures for all ICT systems

Incident Handling

24-hour early warning, 72-hour notification, and 1-month final report procedures

Business Continuity

Backup management, disaster recovery, and crisis management capabilities

Supply Chain Security

European-only supply chain with assessed and monitored third-party risks

End-to-End Encryption Architecture
Audit

Audit & Reporting

Demonstrate compliance to auditors, regulators, and stakeholders with comprehensive automated reporting.

On-Demand Compliance Reports

Generate DORA, GDPR, and NIS2 compliance reports at any time. Pre-formatted for regulatory submission.

Immutable Audit Trails

Every access, configuration change, and operational event logged with tamper-proof audit trails.

Penetration Testing

Regular third-party penetration testing. Results and remediation reports available to customers.

Incident History

Complete incident history with root cause analysis, impact assessment, and remediation documentation.

SLA Reporting

Real-time SLA dashboard with historical uptime, latency, and performance metrics.

Certification Evidence

ISO 27001 and TISAX certification evidence packages available for your own audit processes.