Strategy
Technical due diligence: what investors and acquirers miss
40% of post-acquisition technology transformations exceed their budget by over 50%, per McKinsey. Most DD reviews miss five risks: fragile architecture under load, unpredictable cloud costs, tribal knowledge, untested disaster recovery, and integration blockers. Run technical DD pre-LOI, not after, and tie every finding to a dollar figure.
75% of investors now rank digital maturity as a top-3 driver of enterprise value. That number comes from Bain's 2025 Global Private Equity Report. It means technology is no longer a back-office concern during acquisitions; it is a primary valuation lever.
And yet, most technical due diligence reviews happen too late, cover too little, and miss the risks that blow up post-close. The standard playbook assigns a junior analyst to skim architecture diagrams, check for open-source license violations, and produce a 40-page PDF that nobody reads until something breaks.
This article covers what a thorough technical DD process looks like, where most reviews fall short, and the specific areas you should evaluate before signing.
Why technical DD matters more now than five years ago
Five years ago, a PE firm acquiring a $50M revenue business could treat the tech stack as a line item. If the product worked, the code was "good enough." The value sat in revenue, customer contracts, and brand equity.
That calculus has shifted. SaaS multiples compress when buyers discover tech debt that requires 12-18 months of remediation. Integration timelines double when APIs are undocumented or tightly coupled to a single vendor. Cloud costs spiral when infrastructure was provisioned by guesswork instead of load testing. These surprises erode the value thesis that justified the acquisition price.
A 2024 McKinsey study found that 40% of technology transformations post-acquisition exceed their original budget by more than 50%. The root cause in most cases: risks that existed before close but were not identified during due diligence.
The five hidden risks that standard DD reviews miss
1. Fragile architecture under load
The product works fine at current traffic levels. But the acquisition thesis assumes 3x growth over 24 months. Will the architecture handle it? Most DD reviews never answer this question because they never test it. They review diagrams. They don't run load simulations.
A common failure pattern: the application uses a monolithic database with no read replicas, no caching layer, and queries that scan full tables. At 10,000 daily active users, response times sit under 200ms. At 30,000 DAU, those same queries take 2-4 seconds. At 50,000, the database locks under write contention and the product goes down. This is a $500K-$2M remediation cost that the seller's team won't volunteer.
2. Unpredictable cloud costs
The target company reports $8,000/month in cloud spend. The DD team notes this and moves on. What they don't check: the infrastructure has no autoscaling policies, no reserved instances, and no cost alerts. Three dev environments run 24/7 at production-tier specs. A forgotten Kubernetes cluster costs $1,200/month and serves nothing.
Post-acquisition, when the new owner pushes for growth, cloud costs jump to $25,000/month because nobody optimized the foundation. The real number was always going to be $25,000; the $8,000 figure reflected underutilization, not efficiency.
3. Undocumented dependencies and tribal knowledge
The CTO built the original system four years ago. Two engineers joined later. The three of them hold all architectural context in their heads. No architecture decision records exist. No runbooks. No incident response playbooks. The deployment process involves SSH-ing into a server and running a bash script that one person wrote and one person understands.
When the CTO leaves post-acquisition (and CTOs frequently leave within 12 months of a close), the remaining team cannot ship features, debug production issues, or onboard new engineers without months of reverse-engineering. This is not a technical problem. It is a business continuity risk, and it should be quantified during DD.
4. Weak disaster recovery
Ask the target company two questions: "When was the last time you restored from a backup?" and "What is your recovery time objective?" If the answers are "never" and "we haven't defined one," the DR posture is a liability.
Many companies set up automated backups during initial deployment and never verify them. Databases back up to S3 nightly, but nobody has tested whether those backups restore to a working state. The backup might be corrupted. The restore script might reference infrastructure that no longer exists. You won't know until you need it, and by then, you've lost data and revenue.
5. Integration blockers
The acquisition value often depends on integrating the target's product with the buyer's existing platform. A CRM tool acquired by an enterprise suite needs to plug into SSO, shared billing, and unified analytics. If the target's authentication system is a custom-built solution hardcoded to one identity provider, that integration takes 6 months instead of 6 weeks.
DD reviews should map every integration surface: APIs, webhooks, authentication flows, data formats, and event systems. Each one needs an honest assessment of how much work it takes to connect to the buyer's stack. "We have an API" is not the same as "We have a documented, versioned, rate-limited API with standard authentication and error handling."
The technical DD checklist
This table covers the areas a thorough technical DD review should evaluate. Each area includes specific questions to answer and the risk level if left unexamined.
| Area | What to evaluate | Risk if missed |
|---|---|---|
| Code quality | Test coverage %, linting rules, type safety, code review practices, static analysis results | High |
| Architecture | Service boundaries, data flow diagrams, coupling between components, single points of failure | High |
| Scalability | Load test results, database query performance at 3x-5x current volume, caching strategy, CDN configuration | High |
| Infrastructure | Cloud spend breakdown, autoscaling policies, IaC (Terraform/Pulumi), environment parity | Medium |
| Security | Last penetration test date, vulnerability scan results, secret management, access control audit | High |
| Data management | Backup verification, recovery time objective, data retention policies, GDPR/CCPA compliance | High |
| CI/CD pipeline | Deployment frequency, rollback capability, automated testing in pipeline, build times | Medium |
| Dependencies | Outdated packages, license compliance (GPL risks), vendor lock-in, end-of-life frameworks | Medium |
| Documentation | Architecture decision records, API docs, runbooks, onboarding guides, incident playbooks | Medium |
| Team and knowledge | Key-person risk, bus factor, retention plans for critical engineers, hiring pipeline | High |
| Integration readiness | API versioning, authentication standards (OAuth 2.0/SAML), webhook reliability, data export formats | Medium |
| Observability | Logging coverage, error tracking (Sentry/Datadog), uptime monitoring, alerting thresholds | Medium |
This checklist covers the technical surface area. A complete DD engagement also includes interviews with the engineering team, a review of sprint velocity and delivery cadence, and a commercial assessment of the product roadmap.
When to run technical DD (hint: earlier than you think)
Most firms schedule technical DD after signing a letter of intent. By that point, the deal has momentum. The partners are emotionally invested. The target company knows they're in a strong negotiating position. Discovering a $2M remediation cost at this stage creates an uncomfortable choice: renegotiate the price (which can kill the deal) or absorb the cost (which erodes returns).
Run technical DD pre-LOI or alongside commercial due diligence. A lightweight technical assessment takes 5-10 business days and costs a fraction of the deal value. It gives you the information you need to price the deal correctly from the start.
Early tech DD does three things. First, it identifies dealbreakers before you commit capital and legal fees. Second, it gives you specific data points to negotiate price adjustments tied to remediation costs. Third, it reduces deal friction; when both sides see the technical reality early, there are no late surprises that stall the close.
What good technical DD output looks like
A useful DD report is not a 60-page document filled with architecture diagrams and jargon. It is a decision tool. The people reading it are partners, board members, and deal teams who need to understand risk in financial terms.
A strong technical DD deliverable includes:
- Executive summary (1 page): Go/no-go recommendation with the top 3 risks and their estimated remediation cost.
- Risk register: Each risk categorized by severity (critical, high, medium, low) with a dollar estimate to fix and a timeline to fix.
- Scalability assessment: Can the current architecture support the growth plan? If not, what changes are needed and what do they cost?
- Integration roadmap: A realistic timeline for connecting the target's product to the buyer's platform, with dependencies and blockers called out.
- Team assessment: Key-person risks, skill gaps, and a hiring plan if the post-acquisition roadmap requires capabilities the current team lacks.
- 100-day plan: The highest-priority technical actions for the first 100 days post-close, sequenced by impact and urgency.
Every finding should tie back to dollars and timeline. "The test coverage is 23%" is an observation. "The test coverage is 23%, which means every new feature release carries a 30-40% regression risk; remediating this to 70% coverage will take 6-8 weeks and cost $40,000-$60,000" is actionable intelligence.
Common mistakes acquirers make during tech DD
Relying on the target's self-reported metrics. The seller says they deploy twice a week and have 80% test coverage. Verify it. Pull the deployment logs. Run the test suite. Self-reported engineering metrics are often aspirational, not actual.
Confusing "it works" with "it's well-built." A product can generate $10M in revenue and still run on a codebase that will cost $3M to maintain over the next three years. Working software and maintainable software are different things. DD needs to evaluate both.
Skipping the team interviews. Code tells you what the system does today. The team tells you whether the system can evolve. Talk to individual engineers, not the CTO presenting a slide deck. Ask them: "What would you rebuild if you had 3 months?" Their answers reveal the tech debt they live with daily.
Treating tech DD as a checkbox. Some firms hire a DD provider, receive the report, file it, and proceed with the deal unchanged. The point of DD is to inform the deal terms. If the report identifies $1.5M in remediation costs, that number should appear in the price negotiation. If it doesn't, you paid for the DD and then ignored it.
The bottom line
Technical due diligence is not a compliance exercise. It is a valuation tool. The firms that treat it seriously, staff it with experienced engineers (not generalist consultants), run it early in the deal process, and tie every finding to a dollar figure, are the firms that avoid the post-close surprises that destroy returns.
The cost of a thorough technical DD engagement is 0.1-0.3% of deal value. The cost of missing a critical risk is 10-30% of deal value. The math is straightforward.
Frequently asked questions
What does a technical due diligence review cost?
A thorough technical DD engagement costs 0.1-0.3% of deal value and takes 5-10 business days. The cost of missing a critical risk is 10-30% of deal value. A 2024 McKinsey study found 40% of post-acquisition tech transformations exceed their budget by over 50%, making the DD investment a clear net positive.
When should technical due diligence happen in the deal process?
Run technical DD pre-LOI or alongside commercial due diligence, not after. Most firms schedule it after signing a letter of intent, when deal momentum makes renegotiation awkward. Early DD identifies dealbreakers before you commit legal fees and gives you data points to negotiate price adjustments tied to specific remediation costs.
What are the biggest risks technical due diligence should catch?
Five risks that standard reviews miss: fragile architecture that fails at 3x current load (a $500K-$2M fix), unpredictable cloud costs that triple post-acquisition, tribal knowledge with no documentation, untested disaster recovery backups, and integration blockers that turn a 6-week timeline into 6 months. Each needs a dollar estimate in the DD report.
What should a technical DD report include?
Six deliverables: a 1-page executive summary with go/no-go recommendation and top 3 risks, a risk register with dollar estimates per finding, a scalability assessment against the growth plan, an integration roadmap with dependencies, a team assessment covering key-person risk, and a 100-day post-close action plan prioritized by impact.
Should I trust a target company's self-reported engineering metrics during DD?
No. Always verify independently. Pull deployment logs, run the test suite, and interview individual engineers (not the CTO presenting slides). Self-reported metrics like "80% test coverage" or "we deploy twice a week" are often aspirational. Ask engineers: "What would you rebuild with 3 months?" Their answers reveal the real tech debt.
Related reading
Technical debt is killing your startup. Here's how to fix it.
Your engineers spend 25% of their time servicing code shortcuts from six months ago. That's $125K/year for a five-person team. Here's a system to stop the bleeding.
Why your software project is late (and what to do about it)
66% of software projects exceed their timeline or budget. Six patterns cause most delays, and all of them are preventable. A field guide from someone who ships on time.
Do you need a CTO? The case for fractional technical leadership
A full-time CTO costs $180-250K/year plus equity. A fractional CTO costs $2-5K/month. Here's how to get the technical leadership your startup needs without the full-time hire.
Need a technical due diligence review?
We audit codebases, architecture, and engineering teams for investors and acquirers. Confidential and thorough.
Talk to our team