Third-Party Risk in CI/CD Pipelines under DORA Article 28

DORA Article 28 requires financial entities to manage risks introduced by ICT third-party service providers.

In modern software delivery, CI/CD pipelines are among the most third-party–dependent systems in the organization.

Git platforms, CI runners, plugins, and artifact registries are not just tooling choices — they are embedded external services that directly influence software integrity, availability, and operational resilience.

This article focuses specifically on third-party risk within CI/CD pipelines, explaining where these risks arise, how DORA Article 28 applies, and which controls auditors expect to see enforced.

DORA Article 28 — Tools → Controls → Evidence Diagram mapping enterprise DevSecOps tooling to enforceable CI/CD controls and resulting audit evidence, with cross-cutting DORA Article 28 third-party governance requirements. Tools → Controls → Evidence DORA Article 28 view: third-party ICT governance enforced through CI/CD controls and provable evidence. CROSS-CUTTING (ARTICLE 28) Supplier governance Contract clauses Monitoring Exit plan Evidence retention MAPPING LAYER Tools Platforms & services Controls Enforced requirements Evidence What auditors verify TOOLS Git / Source Hosting CI/CD Orchestrator + Runners Registries + Dependencies Cloud Runtime + Observability CONTROLS Access control + MFA + SoD Approvals + policy gates Integrity: SBOM + signing + provenance Monitoring + incident workflows EVIDENCE Audit logs + access reviews Approvals & change traceability SBOM + attestations + signatures Monitoring data + incident records Tip: Under DORA Article 28, tools are acceptable only if they enforce controls and continuously produce auditable evidence.
Diagram mapping enterprise DevSecOps tooling to enforceable CI/CD controls and resulting audit evidence, with cross-cutting DORA Article 28 third-party governance requirements.

Why CI/CD Pipelines Are a Third-Party Risk Concentration Point

CI/CD pipelines aggregate multiple external dependencies into a single execution flow:

  • source code is hosted externally,
  • builds often run on shared or managed infrastructure,
  • third-party code is pulled automatically,
  • artifacts are stored and distributed by external services.

From a DORA perspective, CI/CD pipelines represent:

  • high-impact ICT dependencies,
  • with privileged access,
  • operating at machine speed,
  • and capable of propagating failures or compromises directly into production.

As a result, CI/CD platforms must be treated as in-scope ICT third-party services under Article 28.

CI/CD Red Flags — DORA Article 28 (Third-Party Risk) Enterprise CI/CD diagram highlighting common DORA Article 28 third-party risk red flags: missing exit plan, shared runners, lack of sub-processor visibility, missing audit rights, and missing evidence retention. CI/CD Red Flags — DORA Article 28 Third-party risk failures auditors frequently flag in Git, CI/CD SaaS, runners, registries, and cloud runtime. CROSS-CUTTING (ARTICLE 28) Supplier governance Audit rights Exit strategy Evidence retention Git Hosting GitHub / GitLab SaaS No audit rights CI/CD SaaS Orchestrator No exit plan CI Runners Cloud execution Shared runners Registries Artifacts + images No retention Cloud Runtime Prod services No sub-processor view ENGINEER REMEDIATION HINTS Tested exit strategy (CI/CD) Dedicated / isolated runners Supplier + sub-processor map Centralized logs + retention Auditor rule: if controls cannot produce time-bound evidence on demand, they are treated as ineffective under Article 28. Focus areas: CI/CD platform scope, contractual auditability, runner isolation, sub-processor governance, and evidence retention.
Enterprise CI/CD diagram highlighting common DORA Article 28 third-party risk red flags: missing exit plan, shared runners, lack of sub-processor visibility, missing audit rights, and missing evidence retention.

GitHub / GitLab SaaS as ICT Third-Party Providers

Risk exposure

GitHub and GitLab SaaS platforms control:

  • access to source code,
  • change approval workflows,
  • identity and permission enforcement.

Compromise or misconfiguration can lead to:

  • unauthorized code changes,
  • bypassed approvals,
  • loss of traceability.

Article 28 expectations

Auditors expect:

  • Git hosting platforms listed in the third-party inventory,
  • clear risk classification (often critical),
  • enforcement of segregation of duties,
  • evidence of access control and approvals.

Access logs, pull request approvals, and branch protection settings are treated as audit evidence, not operational details.


Cloud-Based CI Runners

Risk exposure

Managed or cloud-hosted CI runners:

  • execute untrusted code,
  • access secrets and credentials,
  • interact with internal and external systems.

They often run on shared infrastructure, increasing exposure.

Article 28 expectations

Under Article 28, organizations must demonstrate:

  • isolation between runners,
  • controlled access to secrets,
  • monitoring of execution environments,
  • ability to restrict or revoke runner access.

Auditors frequently ask:

“Who controls the execution environment where your code is built?”


Marketplace Actions and Plugins

Risk exposure

CI/CD marketplaces introduce unvetted third-party code directly into pipelines.

Risks include:

  • supply chain attacks,
  • malicious updates,
  • lack of version control,
  • unclear ownership.

Article 28 expectations

Auditors expect:

  • governance over which plugins are allowed,
  • risk assessment for critical actions,
  • version pinning and review processes,
  • monitoring of changes over time.

Unrestricted marketplace usage is often flagged as a major Article 28 weakness.


Artifact Registries

Risk exposure

Artifact registries store and distribute:

  • build outputs,
  • container images,
  • internal libraries.

If compromised, they can:

  • propagate malicious artifacts,
  • break deployment integrity,
  • affect multiple systems simultaneously.

Article 28 expectations

Auditors expect controls covering:

  • access restrictions,
  • immutability policies,
  • artifact signing and verification,
  • retention of artifact metadata.

Artifact registries are treated as core supply chain components, not passive storage.


Dependency Proxies and External Repositories

Risk exposure

Dependency proxies and external repositories:

  • pull code from outside the organization,
  • introduce indirect third-party dependencies,
  • may change content without notice.

This creates hidden third-party exposure.

Article 28 expectations

Auditors expect:

  • visibility into dependency sources,
  • controls to restrict or cache external dependencies,
  • traceability linking dependencies to builds,
  • monitoring of dependency changes.

SBOMs and dependency logs are often reviewed as Article 28 evidence.


Core CI/CD Controls Expected Under Article 28

Across all CI/CD-related third-party services, auditors expect to see:

  • explicit inclusion in third-party inventories,
  • risk-based classification and governance,
  • access isolation and least privilege,
  • enforceable policies (approvals, gates),
  • continuous monitoring,
  • automated evidence generation.

CI/CD pipelines should enforce these controls by design, not via manual procedures.


Evidence Auditors Commonly Request

For CI/CD third-party risk, auditors frequently request:

  • access logs from Git platforms,
  • CI execution logs and runner metadata,
  • approval records and policy gate results,
  • artifact signing and provenance data,
  • monitoring alerts involving CI/CD services.

These artefacts are used to validate that controls are operating, not just defined.


Relationship with Other DORA Article 28 Controls

CI/CD pipelines often act as the enforcement layer for:

  • contractual requirements,
  • security policies,
  • exit strategy constraints.

They bridge legal, security, and engineering domains — making them central to Article 28 compliance.


Key Takeaway

Under DORA Article 28, CI/CD pipelines are not neutral automation tools.

They are high-risk ICT third-party integration points.

Organizations that:

  • explicitly govern CI/CD third-party services,
  • enforce controls within pipelines,
  • and generate continuous evidence

are significantly better positioned to pass Article 28 audits and manage real operational risk.


Related Content


Audit-ready context

Written for regulated environments: controls before tools, policy enforcement in CI/CD, and evidence-by-design for audits.

Focus areas include traceability, approvals, exception governance, and evidence retention across build, release, and operations.

See methodology on the About page.