Regulation & Compliance
GDPR & IT Security:
Technical Measures under Art. 32
The GDPR is not purely a data protection topic - it imposes concrete requirements on your IT security. Art. 32 obliges organisations to implement demonstrable technical and organisational measures (TOMs). Ignoring this exposes you to fines of up to EUR 20 million or 4% of global annual turnover.
- Maximum fine
- EUR 20M
- Technical measures
- Art. 32
- Breach notification
- 72h
- of global annual turnover
- 4%
Fundamentals
GDPR and IT Security: Why data protection requires technical security
The General Data Protection Regulation (Regulation EU 2016/679) has applied directly in all EU member states since 25 May 2018. It protects the fundamental rights of natural persons in the processing of their personal data. What many organisations underestimate: the GDPR contains concrete security requirements that go far beyond a privacy policy on a website.
Data breaches arise almost exclusively from IT vulnerabilities: unprotected databases, missing encryption, inadequate access management, successful phishing attacks or unpatched weaknesses. The GDPR holds the controller liable for these vulnerabilities - with significant fine exposure.
Crucially, the GDPR does not prescribe specific technologies but requires a risk-based approach. The measures implemented must be appropriate to the risk to the individuals concerned - meaning organisations must know and systematically mitigate the risks of their processing activities.
Art. 32 GDPR
Technical and Organisational Measures (TOMs): What your organisation must implement
Art. 32 GDPR specifies four explicit technical measures and additionally requires a risk-based approach. The following areas are directly relevant for every organisation that processes personal data.
Encryption
Personal data must be encrypted at rest (databases, backups) and in transit (TLS 1.2+, HTTPS). AES-256 for stored data, proper certificate management, no weak cipher suites.
Pseudonymisation
Separation of identifying attributes and content data by technical measures. Re-identification only possible with a separately and securely stored key. Reduces fine exposure in the event of a data breach.
Resilience of systems
Ongoing assurance of confidentiality, integrity and availability. Redundancy concepts, DDoS protection, high-availability architectures. No single points of failure for critical systems.
Recoverability
Ability to restore availability and access to personal data in a timely manner following an incident. Tested backup concepts (3-2-1 rule), documented recovery procedures, regular restore tests.
Regular testing
A process for regularly testing, assessing and evaluating the effectiveness of the TOMs. Penetration tests, vulnerability scans, internal audits and risk reviews are recognised methods.
Access & authorisation control
Role-based access control (RBAC), multi-factor authentication for sensitive systems, regular access reviews, secure password management and comprehensive access logging.
Art. 35 GDPR
Data Protection Impact Assessment (DPIA)
A Data Protection Impact Assessment (DPIA) under Art. 35 GDPR is a structured risk analysis that must be carried out before certain processing activities are commenced. It is methodologically comparable to an IT security risk assessment - and therefore benefits significantly from security expertise.
Each EU supervisory authority publishes a list of processing types that always require a DPIA - including systematic profiling, biometric processing and the use of new technologies involving health data. Beyond these lists, the obligation applies whenever processing is likely to result in a high risk to individuals.
A DPIA must at minimum contain: a systematic description of the processing, an assessment of the necessity and proportionality, an assessment of risks to data subjects, and the measures envisaged to address the risks. An inadequate or missing DPIA is itself subject to fines.
When is a DPIA mandatory?
- Systematic and extensive evaluation of personal aspects by automated processing, including profiling with significant effects on individuals
- Large-scale processing of special categories of data (Art. 9 GDPR: health, religion, ethnicity, political opinions, biometric data)
- Systematic large-scale monitoring of publicly accessible areas (e.g. video surveillance)
- Use of new technologies with insufficiently known risk profiles (AI, IoT, behavioural analytics)
- Processing data of vulnerable individuals (children, employees under employer surveillance)
- Matching or combining datasets from different sources
- Processing biometric or genetic data for unique identification
Source: Art. 35(4) GDPR requires each supervisory authority to establish and publish a list of processing operations subject to the DPIA requirement. See your national supervisory authority's published list for jurisdiction-specific guidance.
Art. 33 & 34 GDPR
Data breach notification obligations
When a personal data breach occurs, the 72-hour clock starts from the moment of discovery. Without prepared incident response processes, meeting this deadline is nearly impossible.
Notify supervisory authority
- Nature and extent of the breach
- Categories of personal data affected
- Approximate number of individuals affected
- Contact details of the DPO
- Likely consequences of the breach
- Measures taken or proposed to address it
Art. 33 GDPR - Report to your lead supervisory authority (or local authority for domestic breaches)
Notify affected individuals
- Only where high risk to individuals exists
- In clear and plain language
- Description of the nature of the breach
- Contact details of the DPO
- Likely consequences
- Recommendations for individuals to mitigate risk
Art. 34 GDPR - Exception applies where affected data was effectively encrypted
Internal documentation
- Full documentation of all breaches
- Record even non-notifiable incidents
- Root cause analysis and remediation measures
- Basis for decision on notification obligation
- Evidence for supervisory authorities
- Retain for at least 3 years
Art. 33(5) GDPR - Accountability principle under Art. 5(2)
Enforcement
GDPR fines and enforcement cases
EU supervisory authorities have imposed significant fines since 2018. These cases illustrate which technical deficiencies most commonly lead to sanctions.
Deutsche Wohnen SE
Archiving system without the ability to delete tenant data that was no longer necessary. Personal data was retained beyond its required retention period, with no technical mechanism for deletion.
Notebooksbilliger.de
Video surveillance of employees without adequate legal basis - for over six years. Absence of purpose limitation and proportionality. A case study in unlawful systematic monitoring of workers.
1&1 Telecom GmbH
Inadequate authentication in the call centre: customers' data could be accessed simply by providing a name and date of birth - without sufficient identity verification. Direct Art. 32 violation.
Bochum retailer
Unencrypted storage of customer data on a server with insufficient access controls. Data breach caused by misconfiguration, with delayed notification to the supervisory authority.
AWARE7 Services
How AWARE7 supports GDPR compliance
GDPR compliance requires technical know-how, not just legal knowledge. Our cybersecurity specialists address exactly the technical requirements that Art. 32 GDPR prescribes.
Penetration Testing
Regular penetration tests directly fulfil the Art. 32(1)(d) obligation to test the effectiveness of TOMs. We uncover vulnerabilities before they lead to notifiable data breaches.
ISMS / ISO 27001
An ISO-27001-conformant information security management system systematically addresses all key Art. 32 requirements and provides documented evidence of TOMs for supervisory authorities.
Vulnerability Scanning
Automated, regular vulnerability scans complement manual penetration tests and ensure continuous monitoring of IT systems at manageable cost.
Security Awareness Training
Over 90% of data breaches start with human error. Our training programmes and phishing simulations demonstrably reduce risk and strengthen TOMs in the area of staff awareness.
Privacy by Design Consulting
We support the technical implementation of Privacy by Design and Default, secure architecture design and the selection of appropriate cryptographic controls.
SME Security Analysis
For organisations without a dedicated security team: a structured assessment of your GDPR security posture with a concrete action plan, clearly prioritised by risk exposure.
Why AWARE7 for GDPR compliance
Was uns von anderen Anbietern unterscheidet
Reine Awareness-Plattformen testen keine Systeme. Reine Beratungskonzerne sind zu weit weg. AWARE7 verbindet beides: Wir hacken Ihre Infrastruktur und schulen Ihre Mitarbeiter - mittelstandsgerecht, persönlich, ohne Enterprise-Overhead.
Forschung und Lehre als Fundament
Rund 20% unseres Umsatzes stammen aus Forschungsprojekten für BSI und BMBF. Unsere Studien analysieren Millionen von Websites und Zehntausende Phishing-E-Mails - publiziert auf ACM- und Springer-Konferenzen. Drei unserer Führungskräfte sind gleichzeitig Professoren an deutschen Hochschulen.
Digitale Souveränität - keine Kompromisse
Alle Daten werden ausschließlich in Deutschland gespeichert und verarbeitet - ohne US-Cloud-Anbieter. Keine Freelancer, keine Subunternehmer in der Wertschöpfung. Alle Mitarbeiter sind sozialversicherungspflichtig angestellt und einheitlich rechtlich verpflichtet. Auf Anfrage VS-NfD-konform.
Festpreis in 24h - planbare Projektzeiträume
Innerhalb von 24 Stunden erhalten Sie ein verbindliches Festpreisangebot - kein Stundensatz-Risiko, keine Nachforderungen, keine Überraschungen. Durch eingespieltes Team und standardisierte Prozesse erhalten Sie einen klaren Zeitplan mit definiertem Starttermin und Endtermin.
Ihr fester Ansprechpartner - jederzeit erreichbar
Ein persönlicher Projektleiter begleitet Sie vom Erstgespräch bis zum Re-Test. Sie buchen Termine direkt bei Ihrem Ansprechpartner - keine Ticket-Systeme, kein Callcenter, kein Wechsel zwischen wechselnden Beratern. Kontinuität schafft Vertrauen.
Für wen sind wir der richtige Partner?
Mittelstand mit 50–2.000 MA
Unternehmen, die echte Security brauchen - ohne einen DAX-Konzern-Dienstleister zu bezahlen. Festpreis, klarer Scope, ein Ansprechpartner.
IT-Verantwortliche & CISOs
Die intern überzeugend argumentieren müssen - und dafür einen Bericht mit Vorstandssprache brauchen, nicht nur technische Findings.
Regulierte Branchen
KRITIS, Gesundheitswesen, Finanzdienstleister: NIS-2, ISO 27001, DORA - wir kennen die Anforderungen und liefern Nachweise, die Auditoren akzeptieren.
Mitwirkung an Industriestandards
OWASP · 2023
OWASP Top 10 for Large Language Models
Prof. Dr. Matteo Große-Kampmann als Contributor im Core-Team des international anerkannten OWASP LLM-Sicherheitsstandards.
BSI · Allianz für Cyber-Sicherheit
Management von Cyber-Risiken
Prof. Dr. Matteo Große-Kampmann als Mitwirkender des offiziellen BSI-Handbuchs für die Unternehmensleitung (dt. Version).
„Art. 32 GDPR is systematically underestimated by many organisations. It does not prescribe specific technologies - but it does require demonstrable, risk-based security measures. Ignoring this creates not just legal liability, but genuine responsibility towards the individuals whose data you process.“
Jan Hornemann
Researcher in Privacy and GDPR · AWARE7 GmbH
Frequently asked questions about GDPR
Answers to the most common questions about GDPR compliance and technical security measures.
What does Art. 32 GDPR require from organisations?
What is a Data Protection Impact Assessment (DPIA) and when is it mandatory?
What fines can be imposed for GDPR violations?
What must be done within 72 hours in the event of a data breach?
Do we need to appoint a Data Protection Officer (DPO)?
What is Privacy by Design and what does it require technically?
How does GDPR relate to information security (ISO 27001)?
Is penetration testing relevant for GDPR compliance?
Aus dem Blog
Weiterführende Artikel
Alle ArtikelBook a free GDPR security consultation
We assess your technical measures against Art. 32 GDPR and show you where action is required - specific, prioritised and with a fixed-price proposal.
Kostenlos · 30 Minuten · Unverbindlich