DORA Article 28 — Tools → Controls → Evidence Mapping

This mapping connects commonly used enterprise DevSecOps and CI/CD tools to the controls required under DORA Article 28, and the evidence auditors expect to review.

The objective is to remove ambiguity between tooling, governance, and compliance.

DORA Article 28 — Tools → Controls → Evidence Diagram mapping enterprise DevSecOps tooling to enforceable CI/CD controls and resulting audit evidence, with cross-cutting DORA Article 28 third-party governance requirements. Tools → Controls → Evidence DORA Article 28 view: third-party ICT governance enforced through CI/CD controls and provable evidence. CROSS-CUTTING (ARTICLE 28) Supplier governance Contract clauses Monitoring Exit plan Evidence retention MAPPING LAYER Tools Platforms & services Controls Enforced requirements Evidence What auditors verify TOOLS Git / Source Hosting CI/CD Orchestrator + Runners Registries + Dependencies Cloud Runtime + Observability CONTROLS Access control + MFA + SoD Approvals + policy gates Integrity: SBOM + signing + provenance Monitoring + incident workflows EVIDENCE Audit logs + access reviews Approvals & change traceability SBOM + attestations + signatures Monitoring data + incident records Tip: Under DORA Article 28, tools are acceptable only if they enforce controls and continuously produce auditable evidence.
Diagram mapping enterprise DevSecOps tooling to enforceable CI/CD controls and resulting audit evidence, with cross-cutting DORA Article 28 third-party governance requirements.

1. Source Code Management (Git Platforms)

Typical tools

  • GitHub Enterprise
  • GitLab
  • Bitbucket
Controls enforcedEvidence produced
Role-based access controlRepository access logs
Segregation of duties (PR vs merge)Branch protection rules
Mandatory reviews & approvalsPull request history
Change traceabilityCommit history
Third-party access governanceUser and token audit logs

Article 28 relevance:

Git platforms are ICT third-party providers influencing code integrity.


2. CI/CD Orchestration Platforms

Typical tools

  • GitHub Actions
  • GitLab CI
  • Jenkins (managed)
  • Azure DevOps Pipelines
Controls enforcedEvidence produced
Pipeline approval gatesPipeline configuration exports
Policy-as-code enforcementPolicy definitions
Controlled execution environmentsRunner configuration
Least privilege pipeline tokensToken scope configuration
Pipeline change loggingCI/CD audit logs

Article 28 relevance:

CI/CD SaaS platforms must be governed as critical ICT suppliers.


3. Build & Dependency Security (SCA / SBOM)

Typical tools

  • Snyk
  • Dependency-Check
  • Mend
  • GitHub Dependabot
  • Syft / CycloneDX
Controls enforcedEvidence produced
Dependency risk analysisSCA reports
SBOM generationSBOM files
Provenance trackingBuild metadata
Vulnerability monitoringAlerts and reports
Supply chain transparencyDependency inventories

Article 28 relevance:

Provides visibility into third-party software risks and subprocessors.


4. Artifact Repositories & Registries

Typical tools

  • Artifactory
  • Nexus
  • Docker registries
  • Cloud container registries
Controls enforcedEvidence produced
Access control on artifactsRepository access logs
Artifact immutabilityRepository configuration
Artifact signingSignature verification
Provenance verificationAttestation records
Retention policiesRetention configuration

Article 28 relevance:

Protects integrity of deliverables provided by third-party systems.


5. Runtime & Cloud Platforms

Typical tools

  • AWS / Azure / GCP
  • Kubernetes platforms
  • Managed PaaS services
Controls enforcedEvidence produced
IAM and role separationIAM policy exports
Network isolationSecurity group configs
Runtime monitoringLogs and metrics
Incident detectionAlerts
Availability monitoringSLA reports

Article 28 relevance:

Cloud providers are critical ICT third-party service providers.


6. Secrets Management

Typical tools

  • HashiCorp Vault
  • Cloud-native secret managers
  • CI/CD secret stores
Controls enforcedEvidence produced
Centralized secrets storageSecret inventory
Access restrictionAccess logs
Secret rotationRotation records
Prevention of hard-coded secretsScan reports
AuditabilitySecret access trails

Article 28 relevance:

Controls access to sensitive data managed by third-party platforms.


7. Monitoring, Logging & SIEM

Typical tools

  • Splunk
  • Elastic
  • Datadog
  • Cloud-native logging
Controls enforcedEvidence produced
Centralized log collectionLog ingestion records
Monitoring of third-party servicesDashboards
Alerting on incidentsAlert logs
Incident correlationIncident tickets
Evidence retentionRetention policies

Article 28 relevance:

Supports continuous monitoring and incident evidence obligations.


8. Identity & Access Management (IAM)

Typical tools

  • Enterprise IAM
  • Cloud IAM
  • SSO platforms
Controls enforcedEvidence produced
Centralized identity managementUser inventories
MFA enforcementAuthentication logs
Role separationRole definitions
Access reviewsReview records
Access revocationOffboarding logs

Article 28 relevance:

Ensures controlled access to third-party ICT platforms.


9. Governance & Risk Management Platforms

Typical tools

  • GRC platforms
  • CMDB
  • Risk registers
Controls enforcedEvidence produced
Supplier inventorySupplier registers
Risk assessmentsRisk reports
Criticality classificationClassification records
Control ownershipRACI documentation
Audit preparationEvidence repositories

Article 28 relevance:

Provides governance backbone for third-party ICT risk management.


End-to-End View (Key Insight)

Under DORA Article 28:

  • Tools do not equal compliance
  • Controls create compliance
  • Evidence proves compliance

Tools are acceptable only if they enforce controls and generate verifiable evidence.


How Auditors Use This Mapping

Auditors typically:

  1. Identify the ICT third-party provider
  2. Verify controls enforced through tooling
  3. Request direct evidence outputs
  4. Validate consistency over time

Any missing link between tool → control → evidence is a potential finding.


Final Takeaway

A DORA-aligned CI/CD environment is one where:

  • every third-party tool is governed,
  • every control is enforced technically,
  • every control produces evidence automatically.

This mapping enables continuous compliance, not last-minute audit preparation.


Recommended Related Content


Audit-ready context

Written for regulated environments: controls before tools, policy enforcement in CI/CD, and evidence-by-design for audits.

Focus areas include traceability, approvals, exception governance, and evidence retention across build, release, and operations.

See methodology on the About page.