DORA Article 28 — Controls & Evidence Mapping

Introduction

This article connects DORA Article 28 obligations to concrete technical controls and the evidence auditors expect to verify. It bridges two complementary perspectives:

  • From tooling to evidence: how commonly used enterprise DevSecOps and CI/CD tools enforce controls and produce audit-ready outputs.
  • From regulation to evidence: how each Article 28 requirement maps to implementable controls and verifiable evidence.

The objective is to remove ambiguity between regulatory text, tooling, governance, and compliance — and provide a single reference for audit preparation and continuous compliance.

Mapping by Article 28 Obligation

1. ICT Third-Party Identification

Article 28 Requirement: Financial entities shall identify and maintain an inventory of all ICT third-party service providers.

Controls implementedEvidence produced
Centralized ICT supplier inventorySupplier register export
Mandatory registration of CI/CD, cloud, SaaS toolingInventory records including CI/CD tooling
Ownership and business mappingSupplier → business service mapping
Periodic inventory reviewReview meeting minutes / logs

2. Criticality Classification

Article 28 Requirement: ICT third-party providers shall be classified based on criticality and risk.

Controls implementedEvidence produced
Risk-based supplier classification frameworkClassification methodology
Identification of critical ICT providersCritical supplier list
CI/CD tools classified when supporting critical servicesCI/CD → service mapping
Governance escalation for critical providersRisk committee records

3. Pre-Contract Due Diligence

Article 28 Requirement: Risk assessments shall be performed before entering into contractual arrangements.

Controls implementedEvidence produced
Security due diligence processDue diligence reports
Risk assessment covering ICT and operational riskRisk assessment documents
Subprocessor disclosure reviewSupplier disclosures
Formal approval before onboardingApproval records

4. Contractual Safeguards

Article 28 Requirement: Contracts shall include minimum security, audit, and exit provisions.

Controls implementedEvidence produced
Standard contract clauses for ICT suppliersContract clause extracts
Audit and inspection rightsSigned contracts
Incident notification SLAsSLA documentation
Evidence retention obligationsContract terms
Exit and termination clausesExit provisions

5. Access Control & Segregation of Duties

Article 28 Requirement: Access to ICT services shall be appropriately controlled.

Controls implementedEvidence produced
Role-based access control (RBAC)IAM configuration exports
Segregation of duties in CI/CDAccess matrix
Privileged access monitoringAccess logs
Periodic access reviewsReview reports

6. CI/CD Enforcement Controls

Article 28 Requirement: Controls shall prevent unauthorized changes and ensure integrity.

Controls implementedEvidence produced
Mandatory approvals and policy gatesPipeline configurations
Policy-as-code enforcementPolicy definitions
Controlled CI/CD runnersRunner configuration
Artifact integrity protectionSBOM, signing reports
Change traceabilityCI/CD audit logs

7. Monitoring & Incident Management

Article 28 Requirement: ICT third-party risks shall be continuously monitored.

Controls implementedEvidence produced
Continuous monitoring of ICT servicesMonitoring dashboards
Alerting on third-party failuresAlert logs
Incident trackingIncident tickets
Incident escalation proceduresIncident workflows
Post-incident reviewsRCA reports

8. Subprocessor Governance

Article 28 Requirement: Risks arising from subcontracting chains shall be managed.

Controls implementedEvidence produced
Visibility into subprocessorsSupplier disclosures
Subprocessor approval processApproval records
Risk assessments for subprocessorsRisk reports
Monitoring of subprocessor changesChange notifications

9. Exit Strategy & Resilience

Article 28 Requirement: Exit strategies shall ensure continuity in case of supplier failure.

Controls implementedEvidence produced
Documented exit strategiesExit plans
Feasibility assessmentsFeasibility reports
Exit or fallback testingTest reports
Periodic review of exit plansReview records

10. Evidence Management & Retention

Article 28 Requirement: Evidence shall be available, protected, and retained.

Controls implementedEvidence produced
Centralized evidence repositoryEvidence storage
Time-stamped, immutable logsLog configuration
Retention policies enforcedRetention policy documents
Controlled access to evidenceAccess logs
On-demand evidence productionAudit extracts

Mapping by Tooling Category

The following section maps commonly used enterprise DevSecOps tools to the controls they enforce and the evidence they produce under DORA Article 28.

DORA Article 28 — Tools → Controls → Evidence Diagram mapping enterprise DevSecOps tooling to enforceable CI/CD controls and resulting audit evidence, with cross-cutting DORA Article 28 third-party governance requirements. Tools → Controls → Evidence DORA Article 28 view: third-party ICT governance enforced through CI/CD controls and provable evidence. CROSS-CUTTING (ARTICLE 28) Supplier governance Contract clauses Monitoring Exit plan Evidence retention MAPPING LAYER Tools Platforms & services Controls Enforced requirements Evidence What auditors verify TOOLS Git / Source Hosting CI/CD Orchestrator + Runners Registries + Dependencies Cloud Runtime + Observability CONTROLS Access control + MFA + SoD Approvals + policy gates Integrity: SBOM + signing + provenance Monitoring + incident workflows EVIDENCE Audit logs + access reviews Approvals & change traceability SBOM + attestations + signatures Monitoring data + incident records Tip: Under DORA Article 28, tools are acceptable only if they enforce controls and continuously produce auditable evidence.
Diagram mapping enterprise DevSecOps tooling to enforceable CI/CD controls and resulting audit evidence, with cross-cutting DORA Article 28 third-party governance requirements.

1. Source Code Management (Git Platforms)

Typical tools: GitHub Enterprise, GitLab, Bitbucket

Controls enforcedEvidence produced
Role-based access controlRepository access logs
Segregation of duties (PR vs merge)Branch protection rules
Mandatory reviews & approvalsPull request history
Change traceabilityCommit history
Third-party access governanceUser and token audit logs

Article 28 relevance: Git platforms are ICT third-party providers influencing code integrity.

2. CI/CD Orchestration Platforms

Typical tools: GitHub Actions, GitLab CI, Jenkins (managed), Azure DevOps Pipelines

Controls enforcedEvidence produced
Pipeline approval gatesPipeline configuration exports
Policy-as-code enforcementPolicy definitions
Controlled execution environmentsRunner configuration
Least privilege pipeline tokensToken scope configuration
Pipeline change loggingCI/CD audit logs

Article 28 relevance: CI/CD SaaS platforms must be governed as critical ICT suppliers.

3. Build & Dependency Security (SCA / SBOM)

Typical tools: Snyk, Dependency-Check, Mend, GitHub Dependabot, Syft / CycloneDX

Controls enforcedEvidence produced
Dependency risk analysisSCA reports
SBOM generationSBOM files
Provenance trackingBuild metadata
Vulnerability monitoringAlerts and reports
Supply chain transparencyDependency inventories

Article 28 relevance: Provides visibility into third-party software risks and subprocessors.

4. Artifact Repositories & Registries

Typical tools: Artifactory, Nexus, Docker registries, Cloud container registries

Controls enforcedEvidence produced
Access control on artifactsRepository access logs
Artifact immutabilityRepository configuration
Artifact signingSignature verification
Provenance verificationAttestation records
Retention policiesRetention configuration

Article 28 relevance: Protects integrity of deliverables provided by third-party systems.

5. Runtime & Cloud Platforms

Typical tools: AWS / Azure / GCP, Kubernetes platforms, Managed PaaS services

Controls enforcedEvidence produced
IAM and role separationIAM policy exports
Network isolationSecurity group configs
Runtime monitoringLogs and metrics
Incident detectionAlerts
Availability monitoringSLA reports

Article 28 relevance: Cloud providers are critical ICT third-party service providers.

6. Secrets Management

Typical tools: HashiCorp Vault, Cloud-native secret managers, CI/CD secret stores

Controls enforcedEvidence produced
Centralized secrets storageSecret inventory
Access restrictionAccess logs
Secret rotationRotation records
Prevention of hard-coded secretsScan reports
AuditabilitySecret access trails

Article 28 relevance: Controls access to sensitive data managed by third-party platforms.

7. Monitoring, Logging & SIEM

Typical tools: Splunk, Elastic, Datadog, Cloud-native logging

Controls enforcedEvidence produced
Centralized log collectionLog ingestion records
Monitoring of third-party servicesDashboards
Alerting on incidentsAlert logs
Incident correlationIncident tickets
Evidence retentionRetention policies

Article 28 relevance: Supports continuous monitoring and incident evidence obligations.

8. Identity & Access Management (IAM)

Typical tools: Enterprise IAM, Cloud IAM, SSO platforms

Controls enforcedEvidence produced
Centralized identity managementUser inventories
MFA enforcementAuthentication logs
Role separationRole definitions
Access reviewsReview records
Access revocationOffboarding logs

Article 28 relevance: Ensures controlled access to third-party ICT platforms.

9. Governance & Risk Management Platforms

Typical tools: GRC platforms, CMDB, Risk registers

Controls enforcedEvidence produced
Supplier inventorySupplier registers
Risk assessmentsRisk reports
Criticality classificationClassification records
Control ownershipRACI documentation
Audit preparationEvidence repositories

Article 28 relevance: Provides governance backbone for third-party ICT risk management.

End-to-End View

Under DORA Article 28:

  • Tools do not equal compliance.
  • Controls create compliance.
  • Evidence proves compliance.

Tools are acceptable only if they enforce controls and generate verifiable evidence.

How Auditors Use This Mapping

Auditors typically:

  1. Start from Article 28 requirements (obligation mapping).
  2. Identify the ICT third-party provider and its tooling category.
  3. Verify that controls exist and operate through tooling.
  4. Request direct evidence outputs for each control.
  5. Validate consistency over time.

Any missing link between obligation → control → evidence, or between tool → control → evidence, is a potential finding. If a control cannot produce evidence, it is considered ineffective.

Key Takeaway

DORA Article 28 compliance is achieved when every regulatory requirement is traceable to controls, and every control produces evidence — regardless of which tooling is used.

This dual mapping (by obligation and by tool) provides the backbone for:

  • audit preparation,
  • continuous compliance,
  • CI/CD governance in regulated environments.

A DORA-aligned CI/CD environment is one where every third-party tool is governed, every control is enforced technically, and every control produces evidence automatically.


Recommended Related Content


Audit-ready context

Written for regulated environments: controls before tools, policy enforcement in CI/CD, and evidence-by-design for audits.

Focus areas include traceability, approvals, exception governance, and evidence retention across build, release, and operations.

See methodology on the About page.