If you're an EU-based business, a public-sector buyer, or an operator under NIS2 or sectoral compliance frameworks, "GDPR-compliant DNS" is part of your procurement checklist. This page walks through what that actually means in 2026, what to ask vendors in the RFP stage, and which DNS providers structurally fit.
What "GDPR-compliant DNS" actually means
GDPR doesn't certify products. There's no "GDPR-compliant" stamp. What there is:
- Personal data definitions. DNS query data — IP addresses, queried names, timestamps — can be personal data under GDPR (Article 4(1), confirmed by the CJEU in Breyer v. Germany, 2016).
- Controller / processor obligations. If your DNS provider processes personal data on your behalf, they are a processor and you are a controller (Article 28). That triggers requirements: a written DPA, restricted processing, subprocessor controls, breach notification, audit rights, and so on.
- Lawful transfer mechanisms. If the processor is outside the EU/EEA, you need a lawful basis for the transfer: EU–US Data Privacy Framework (if certified), Standard Contractual Clauses (SCCs) with a Transfer Impact Assessment (TIA), or Binding Corporate Rules.
- Data minimisation, purpose limitation, retention limits, and right-of-access. Apply to whatever query metadata the provider stores.
A "GDPR-compliant" DNS provider, in the practical sense, is one that:
- Has a published, executable DPA with SCCs / DPF as appropriate.
- Has clear data-handling, retention, and subprocessor disclosures.
- Operates with personal data minimisation by default (no advertising-driven query log monetisation).
- Has incident-reporting commitments aligned with GDPR Article 33's 72-hour requirement.
- Either is structurally EU-jurisdiction (simpler audit story) or has a credible cross-border transfer regime (extra audit work).
The 12-question procurement checklist
Drop these directly into your RFP. Ask vendors for written answers — verbal commitments don't survive an audit.
- Where is your company headquartered, and under which legal regime do you operate?
- Where are your operations team and primary ops infrastructure located?
- Where is authoritative zone data stored? Is it ever processed outside the EU/EEA?
- Do you have a publicly available Data Processing Agreement we can execute? (Send me the link.)
- What is the lawful basis for any transfer of personal data outside the EU/EEA? (DPF certification? SCCs? Adequacy?)
- What query metadata do you store? For how long? Who can access it? Is it ever used for advertising or monetisation?
- What is your subprocessor list, and how do you notify customers of changes?
- What is your breach-notification SLA, and is it aligned with GDPR Article 33?
- Do you have ISO 27001 / SOC 2 Type II / other relevant certifications? Provide the latest reports.
- Are you in scope for NIS2, and what is your status against its incident-reporting obligations?
- Can I exercise data-subject rights (access, deletion, portability) for personal data in your query logs?
- Can I cancel and have all my zone data and query metadata deleted within 30 days?
The answers tell you more than any marketing page.
How to score the responses
Not every question carries equal weight. Here's a suggested weighting framework you can adapt to your context. Score each provider 0–3 per question (0 = no answer / non-responsive, 1 = partial / weak, 2 = adequate, 3 = strong / documented).
| Question | Weight | What a "3" looks like |
|---|---|---|
| Q1 — HQ / jurisdiction | 3× | EU headquarters, written confirmation. |
| Q2 — Ops location | 2× | EU-based ops team. Primary ops infrastructure disclosed publicly or on request. |
| Q3 — Zone data location | 3× | Zone data stored and processed in EU/EEA. Clear statement available. |
| Q4 — DPA | 3× | Published DPA link. Executable during onboarding. |
| Q5 — Transfer basis | 3× | For non-EU: DPF certification + SCCs + TIA guidance provided. For EU: no transfer needed, stated. |
| Q6 — Query metadata | 2× | Data types, retention in days, no advertising use, documented. |
| Q7 — Subprocessors | 2× | Public list. Commit to notification. |
| Q8 — Breach SLA | 2× | SLA matches or exceeds Article 33 (72h). Incident response plan described. |
| Q9 — Certifications | 1× | Active ISO 27001 and/or SOC 2 Type II. Link to certificate/registry. |
| Q10 — NIS2 status | 1× | In scope. Status disclosed. Incident-reporting workflow confirmed. |
| Q11 — Data-subject rights | 1× | Process documented. DPO contact published. |
| Q12 — Cancellation & deletion | 1× | Export + deletion commitment within 30 days. |
Multiply score by weight for a weighted total (max possible: 72). Don't treat the number as absolute — it's a structured conversation starter. A US provider scoring 55 with strong DPF documentation might be a better operational fit than an EU provider scoring 40 with weak documentation.
Run this scoring exercise for each provider on your shortlist, attach the scores to your procurement record, and re-score at contract review. Changes in a provider's posture (new DPA, dropped certification, subprocessor addition) should trigger a re-score.
Procurement artefacts — what to collect and what to look for
Before you sign anything, collect these documents. Each one should be read — not filed unread — because the details in them are what a data-protection authority will ask about.
| Artefact | Where to get it | What to look for |
|---|---|---|
| Data Processing Agreement (DPA) | Provider's legal page or on request | Explicit Article 28 reference. Subprocessor list included or linked. Transfer mechanism stated (SCC module, DPF certification ID). Audit-rights clause. Breach-notification timeline in hours. |
| Subprocessor register | DPA appendix or separate disclosure | Date of last update. Names and jurisdictions of subprocessors. Notice period for additions. Right to object? |
| Transfer Impact Assessment (TIA) | You write it; provider supplies inputs | For non-EU providers only. Documents that surveillance laws don't undermine SCC protections in your specific use case. If the provider publishes a TIA template or white paper, review it — but don't substitute it for your own. The TIA is your legal obligation. |
| Certification reports (ISO 27001, SOC 2) | Provider's trust centre or on request | Date of issue and expiry. Scope — does it cover DNS infrastructure and operations, or only the billing portal? Auditor name. |
| Incident-response policy / post-incident reports | Security page or blog | Are post-incident reports published? What's the format? For NIS2-regulated buyers, verify the 24h/72h/1-month structure. |
| Data-retention and deletion policy | DPA or privacy policy | Specific retention periods for query metadata, billing logs, and zone data. Deletion process after contract termination. Confirmation of deletion. |
Collect these before the contract is signed. Once a provider is in production, replacing them is harder than qualifying them.
How major DNS providers stack up
Status legend: 🟢 structural fit · 🟡 satisfiable with extra audit work · 🔴 problematic.
EU-headquartered providers
| Provider | HQ jurisdiction | EU ops | DPA / SCCs | Certifications | Sovereignty fit |
|---|---|---|---|---|---|
| DNScale | EU | EU | Yes | ISO 27001 | 🟢 Structural |
| Hetzner DNS | DE (EU) | EU | Yes | ISO 27001 | 🟢 Structural |
| Gandi LiveDNS | FR (EU) | EU | Yes | — | 🟢 Structural |
| OVHcloud DNS | FR (EU) | EU | Yes | ISO 27001, SOC 2, HDS, SecNumCloud | 🟢 Structural |
| Bunny DNS | SI (EU) | EU | Yes | — | 🟢 Structural |
| ClouDNS | BG (EU) | EU | Yes | — | 🟢 Structural |
US-headquartered providers
| Provider | HQ jurisdiction | EU operations | DPA / SCCs | DPF certified | Certifications | Sovereignty fit |
|---|---|---|---|---|---|---|
| Cloudflare DNS | US | Global edge | Yes (SCCs) | Yes | ISO 27001, SOC 2 Type II | 🟡 Satisfiable with TIA |
| AWS Route 53 | US | Global edge | Yes (SCCs) | Yes | ISO 27001, SOC 2, FedRAMP | 🟡 Satisfiable with TIA |
| Google Cloud DNS | US | Global edge | Yes (SCCs) | Yes | ISO 27001, SOC 2 | 🟡 Satisfiable with TIA |
| NS1 (IBM) | US | Global edge | Yes (SCCs via IBM) | Yes (via IBM) | ISO 27001, SOC 2 | 🟡 Satisfiable with TIA |
| DNS Made Easy | US | Global edge | Yes (SCCs) | Yes | SOC 2 Type II | 🟡 Satisfiable with TIA |
🔴 cases are providers without any DPA/SCC mechanism, or with documented data-handling practices that don't meet GDPR processor requirements. Not naming names — confirm with each vendor's published DPA.
NIS2 and GDPR — how the two frameworks interact for DNS procurement
GDPR and NIS2 are separate legal instruments, but for DNS procurement they overlap in practice. Understanding the interaction makes your procurement exercise once-and-done rather than twice-the-pain.
| Area | GDPR | NIS2 | Overlap in DNS procurement |
|---|---|---|---|
| Scope | Any entity processing EU personal data | Essential and important entities in named sectors | If you're a NIS2-regulated entity, your DNS provider selection is part of supply-chain risk. If you also handle EU personal data, GDPR processor obligations apply simultaneously. |
| Due diligence | Article 28 — processor must provide sufficient guarantees | Article 21(2)(d) — supply-chain security | The evidence you collect is largely the same: DPA, certifications, subprocessor list, incident-response capability. |
| Incident reporting | Article 33 — personal data breach notification within 72h | Article 23 — significant incident early warning 24h / notification 72h / final report 1 month | A DNS outage that exposes query logs is a personal data breach under GDPR and a significant incident under NIS2. Both reporting obligations may fire. Your DNS provider should have processes for both. |
| Jurisdiction | Applies wherever EU personal data is processed; foreign processors need SCCs/DPF | Applies to EU entities; foreign suppliers evaluated under supply-chain risk | An EU-jurisdiction provider satisfies both without extra mechanisms. A non-EU provider requires cross-border mechanisms for GDPR and extra due diligence for NIS2. |
| Fines | Up to €20M or 4% of global turnover | Up to €10M or 2% for essential entities | Not mutually exclusive. A DNS-related incident could trigger penalties under both frameworks. |
The takeaway: do the procurement once, collect the evidence once, and document it in a format that serves both regulatory regimes. The NIS2 supply-chain evidence and GDPR processor-selection evidence should live in the same procurement record.
For the full NIS2 context — which sectors are in scope, Article 21 measures in detail, incident-reporting timelines — see the NIS2 and DNS guide.
When "structural fit" matters more than "satisfiable"
For most workloads, a US-headquartered provider with DPF certification + SCCs + a TIA is fine — the legal regime is clear, the contractual mechanism exists, the audit overhead is bounded.
It matters more when:
- You're under NIS2 as an essential or important entity and supply-chain risk is part of your assessment. A structurally EU-jurisdiction provider materially simplifies that assessment.
- You're a public-sector buyer with explicit sovereignty mandates (e.g., French SecNumCloud, German BSI Cloud Computing Compliance Catalogue, EU CSIRT criteria).
- Your customers' procurement requires it. Increasingly common in EU-headquartered enterprises selling to other EU enterprises — DNS is in the supply-chain risk assessment.
- You handle high-sensitivity personal data (healthcare, financial, children's data) where DPAs default to extra scrutiny.
- You're in a sector with specific guidance (DORA for financial services, EHDS for health data) that effectively prefers EU-jurisdiction processors.
For everything else — early-stage SaaS, dev/test, non-regulated content sites — pick the provider that fits your stack. GDPR compliance is achievable on either side.
Buyer-scenario guide — which provider profile fits
Not every buyer needs the same level of due diligence. Here's how the decision maps to common scenarios.
| Buyer profile | Regulatory risk | Recommended approach | Typical shortlist |
|---|---|---|---|
| Early-stage startup (pre-revenue, non-regulated, small team) | Low | DPA signed. Don't over-engineer. Focus on product. Revisit when you enter a regulated sector or raise Series A. | DNScale (simplicity), Bunny DNS (cheap), Cloudflare Free (zero cost, but no DPA on free tier). |
| Growth-stage SaaS (EU customers, hiring DPO, ISO 27001 in progress) | Medium | Full 12-question checklist. Scored provider comparison. Signed DPA. TIA for any non-EU provider. Document the decision. | DNScale, OVHcloud DNS, Cloudflare (if TIA and DPA are in place). |
| Regulated enterprise (finance, energy, health, NIS2 essential) | High | Full procurement record. Weighted scoring. Procurement artefacts collected for every provider. NIS2 supply-chain evidence packaged alongside GDPR processor-selection evidence. Prefer EU-jurisdiction unless there's a strong operational reason not to. | DNScale (EU ops page documented), OVHcloud (multi-cert), Hetzner (DE public-sector fit). US providers only with documented TIA and legal approval. |
| Public-sector / government | High, with political dimension | Procurement often governed by public-procurement law with explicit sovereignty clauses. EU jurisdiction usually mandatory. Check tender documentation for specific certification requirements (SecNumCloud, BSI C5, ENS High). | OVHcloud (SecNumCloud), Hetzner (BSI C5), DNScale (EU-only network option). |
DNScale's GDPR posture
For transparency, here's how DNScale specifically answers the 12-question checklist:
- HQ / jurisdiction: EU.
- Operations: EU (specific locations on the network page).
- Zone data location: EU. Replicates to a global anycast edge for performance, but the source of truth is EU.
- DPA: Yes, published; can be signed as part of onboarding.
- Cross-border transfers: None for authoritative zone data. Edge query handling occurs at PoP locations worldwide; aggregated query metadata for billing returns to EU storage.
- Query metadata: Aggregated. Retention bounded to billing and operational diagnostics. Not used for advertising. Not sold.
- Subprocessors: Disclosed; notification on change.
- Breach notification: Aligned with Article 33's 72-hour requirement.
- Certifications: ISO 27001 certified. NIS2 in progress.
- NIS2: Yes, in scope. Operational obligations met.
- Data-subject rights: Yes, support is via the published DPO contact.
- Cancellation: Zone data export and deletion within 30 days.
Specific contractual artefacts available on request via support. For the infrastructure details that underpin these claims — AS numbers, IXP peering, network architecture — see the DNScale infrastructure and EU operations page.
Audit-readiness — what your internal team needs to produce
If a data-protection authority or NIS2 regulator asks about your DNS provider selection, the response window is short. Have a processor selection record ready before they ask. Here's a template.
Processor selection record — template
Provider: [Name] Date of selection: [Date] Date of most recent review: [Date] Review cadence: [e.g., annually, or on contract renewal]
1. Selection criteria — Adapt the 12-question checklist above to your context. List the criteria you used and their weightings.
2. Shortlist and scores — Attach the weighted scoring table for each shortlisted provider. Include the rationale for the chosen provider.
3. Contractual artefacts on file — Check each one:
- Signed DPA
- Subprocessor register (date of last update: ___)
- Transfer Impact Assessment (if non-EU provider; date of assessment: ___)
- Certification reports (ISO 27001 expiry: ___, SOC 2 date: ___)
- Incident-response policy / last post-incident report (date: ___)
- Data-retention and deletion policy (retention period: ___)
4. Risk assessment — Note any risks identified and mitigated. Example: "Provider uses US-based subprocessor for CDN cache (Cloudflare); accepted because the subprocessor has DPF certification and our DPA includes subprocessor obligations. Risk: medium. Mitigation: monitored."
5. DPO / legal review — Name of reviewer and date of sign-off.
6. Next review date — Scheduled.
Store this record where your DPO can retrieve it within 48 hours. Don't create it during an audit — have it maintained as a living document. Update it when the provider changes their DPA, adds subprocessors, drops a certification, or announces a material change to their infrastructure.
Related comparisons
- Best EU DNS providers 2026 — the full round-up
- DNScale vs Cloudflare DNS
- DNScale vs AWS Route 53
- DNScale vs Google Cloud DNS
- Best DNS for multi-provider redundancy
References
- GDPR official text (EUR-Lex)
- EU–US Data Privacy Framework
- NIS2 Directive (EU 2022/2555)
- ENISA: guidance on GDPR for cloud and DNS providers
- Court of Justice of the European Union, Breyer v. Bundesrepublik Deutschland, C-582/14 (2016) — IP addresses as personal data
- DNScale NIS2 and DNS compliance guide
- DNScale infrastructure and EU operations