DORA Compliance Architecture — Explained

The Digital Operational Resilience Act (DORA) introduces a fundamental shift in how regulated organizations must design, operate, and govern their ICT systems. Under DORA, compliance is no longer limited to policies or periodic controls—it must be embedded directly into technical architectures and operational workflows.

This article provides a conceptual and architectural explanation of how CI/CD pipelines fit into the DORA compliance model. It explains why modern software delivery pipelines must be treated as regulated ICT systems, how security and resilience controls are expected to operate across the software lifecycle, and where DORA requirements intersect with DevSecOps practices.

The goal of this article is understanding: clarifying the architectural intent behind DORA, introducing key concepts such as policy enforcement, evidence-by-design, and operational traceability, and helping readers build the right mental model before moving into implementation or audit preparation.

For readers looking for the formal reference architecture used across this site—including explicit mappings to DORA Articles, control objectives, and audit-ready evidence—see:
DORA Compliance Architecture: CI/CD as a Regulated ICT System.


DORA Compliance Architecture (Overview)

DORA Compliance Architecture – CI/CD as Regulated System Architecture diagram showing how CI/CD pipelines enforce DORA Article 21 ICT risk management controls and generate continuous compliance evidence. DORA Compliance Architecture Article 21 · CI/CD as Regulated ICT System CONTINUOUS COMPLIANCE EVIDENCE Audit logs Approvals & SoD Artifact provenance Monitoring events Retention & reporting DORA Governance ICT Risk Management Risk identification Policies & oversight CI/CD Pipeline DORA Article 21 Enforcement Access control & segregation of duties Change approval & policy gates Security testing & integrity checks Production & Operations Operational Resilience Runtime monitoring Incident response
How CI/CD pipelines enforce DORA Article 21 ICT risk management controls and generate continuous compliance evidence.

“DORA Compliance Architecture – CI/CD as a Regulated ICT System”

This architecture shows how governance, CI/CD pipelines, and production operations work together to support continuous compliance and operational resilience under DORA.


How to Read This Diagram

The diagram is read from left to right, representing the flow of control and responsibility across the software delivery lifecycle:

  1. Governance & ICT Risk Management
  2. CI/CD Pipelines as Regulated Systems
  3. Production & Operations

A cross-cutting evidence layer spans all components, highlighting the continuous generation of audit-ready evidence.


Governance & ICT Risk Management Layer

The left side of the diagram represents the governance layer required by DORA. This is where ICT risks are identified, assessed, and managed.

This layer includes:

  • ICT risk management frameworks
  • Policies and standards
  • Defined ownership and accountability
  • Oversight and review mechanisms

CI/CD pipelines are explicitly included in this scope. Treating pipelines as out-of-scope tooling is a common gap identified during DORA assessments.


CI/CD Pipelines as Regulated ICT Systems

At the center of the architecture, CI/CD pipelines act as control enforcement systems rather than simple automation tools.

In this architecture, CI/CD pipelines enforce:

  • Access control and segregation of duties
  • Mandatory approval workflows
  • Policy enforcement gates
  • Security testing and integrity checks

All production changes flow through CI/CD pipelines, ensuring that governance requirements are enforced consistently and automatically.


Production & Operations Layer

The right side of the diagram represents production and operational environments.

This layer focuses on:

  • Runtime monitoring and alerting
  • Incident detection and response
  • Rollback and recovery mechanisms
  • Controlled access to production systems

CI/CD pipelines integrate with operational controls to support DORA’s operational resilience objectives.


Continuous Compliance Evidence (Cross-Cutting)

Across all layers, the architecture generates continuous compliance evidence.

This includes:

  • Pipeline execution logs
  • Approval and segregation-of-duties records
  • Security scan results
  • Artifact provenance and deployment history
  • Monitoring and incident records

Evidence is system-generated, timestamped, and retained, enabling organizations to support audits without relying on manual documentation.


Why This Architecture Matters for DORA

DORA does not require organizations to document compliance after the fact. It requires them to operate securely and resiliently at all times.

This architecture translates DORA Article 21 requirements into:

  • Technical enforcement instead of procedural controls
  • Continuous evidence instead of periodic audits
  • Operational resilience instead of reactive remediation

CI/CD pipelines become compliance assets rather than audit risks.


From Architecture to Detailed Controls

This diagram provides the architectural baseline. Detailed interpretations, mappings, and audit guidance are covered in the following resources:


Conclusion

DORA compliance starts with architecture. By treating CI/CD pipelines as regulated ICT systems and embedding governance, control enforcement, and evidence generation into technical workflows, organizations can meet regulatory expectations with confidence.

This diagram provides a clear, shared understanding of how DORA compliance is implemented in practice across the software delivery lifecycle.


Audit-ready context

Written for regulated environments: controls before tools, policy enforcement in CI/CD, and evidence-by-design for audits.

Focus areas include traceability, approvals, exception governance, and evidence retention across build, release, and operations.

See methodology on the About page.