GDPR for SaaS startups.
The minimum that actually moves deals.
If you're a 10–50 person SaaS team selling to EU customers, this is what you actually need to ship — and what you can defer until you have the headcount. Written from the engineering side, not the consulting side.
Startups, not enterprises.
The advice in this guide is wrong for a 5,000-person bank. It is mostly right for a Series A SaaS company that has its first EU customer asking pointed questions in a security review and isn't sure which ones are real.
The thesis: you can do enough GDPR engineering work in two sprints to move enterprise deals through procurement. Doing more than that, before you have customers paying for it, is premature.
What enterprise procurement actually checks.
- check_circleEncryption at rest and in transitTLS 1.2+, AES-256 at rest. Cloud-default in 2026; just confirm and document.
- check_circleAccess control with audit logRBAC, least privilege, MFA on admin paths, periodic access review on a real cadence (quarterly is fine).
- check_circleA working delete pipelineWhen a customer asks "delete my user's data," the answer is a script you run, not a project you scope. Test it.
- check_circleA documented sub-processor listWho you share data with (analytics, error tracking, hosting). Public page, updated when it changes. Article 28 territory.
- check_circleA breach notification pathWho detects, who decides it's reportable, who notifies the customer. 72-hour clock. Most teams skip this until the day it matters.
- check_circleA DPA you'll actually signStandard Contractual Clauses or your own DPA template, ready to send. Not engineering work, but procurement won't close without it.
The things you don't need yet.
Procurement doesn't ask for these on day one, and most early-stage teams over-invest here:
- check_circleA formal DPIA programYou need DPIAs for high-risk processing (Article 35). Most SaaS products at your stage do not do high-risk processing. Write one when you actually need one.
- check_circleAn EU representative (Article 27)Required if you have no EU establishment and process EU data on a non-occasional basis. Easy to fix when needed; not blocking your first deal.
- check_circleISO 27001 / SOC 2 certificationNot a GDPR requirement. Useful for procurement leverage at Series B+, expensive to chase too early.
- check_circleA full Records of Processing Activities documentArticle 30 requires it; tooling makes it cheap. Don't hand-write the document.
What two engineers can actually ship.
- 01Sprint 1 — Lock the perimeterConfirm encryption (in transit + at rest, including S3 buckets and database backups). Audit IAM roles, kill stale access, enable MFA on admin paths. Document the result. ~1 sprint for two engineers.
- 02Sprint 2 — DSR + delete pipelineBuild the data export endpoint and the delete pipeline. Test that delete propagates to backups, search indexes, replicas, and analytics warehouses. Write a runbook your support team can run.
- 03Concurrent — Sales artifactsSub-processor list, DPA template, security overview one-pager. These get the deals through procurement; the engineering above gets you through the technical review that follows.
Where RuleMesh fits.
If you have a coding agent (Claude Code, Cursor, Codex), most of the engineering work above can be implemented from a single prompt: "implement the access-control-security bundle." RuleMesh's MCP server returns the requirements, the cloud control mappings, and the evidence schema; the agent writes the code; the evidence flows back to your tracker.
Free MCP install, no credit card. The Jira app for tracking the work is on a waitlist while Atlassian Marketplace approval finalizes — the headless MCP loop works either way.
Related guides
Run this loop on your codebase.
Free MCP install. No credit card. Start with the agent you already use.