Architecture

CI/CD as a Regulated System

In regulated environments, CI/CD pipelines are not just automation tools.
They are enforcement systems.

Architecture determines whether:

  • Security controls are mandatory or optional
  • Policies are documented or enforced
  • Evidence is manual or system-generated
  • Compliance is reactive or continuous

This is the foundational insight for auditors: architecture is where compliance becomes technical reality. A well-designed pipeline makes non-compliance structurally difficult. A poorly designed one makes it structurally inevitable.

New to these concepts? See our Glossary for plain-language definitions of CI/CD terms.


Why Architecture Comes First

Before discussing tools, frameworks, or audits, one principle must be clear:

If your architecture does not enforce controls, no checklist will save you.

A secure CI/CD architecture:

  • Prevents unapproved production changes — through mandatory RBAC and approval gates
  • Blocks policy violations automatically — through policy-as-code enforcement
  • Generates traceable logs — for every pipeline execution, approval, and deployment
  • Preserves evidence for regulators — with immutable, timestamped records
  • Supports exit and resilience requirements — critical for DORA and NIS2

Controls must be built into the system — not layered on top of it.


What Auditors Should Assess in CI/CD Architecture

When reviewing CI/CD architecture, auditors should evaluate five key questions:

QuestionWhat Good Looks LikeRed Flag
Can security stages be skipped?All stages mandatory; no bypass without governed exceptionStages can be commented out or disabled by developers
Who can deploy to production?Deployment restricted to specific roles; different from code authorsAnyone with repo access can trigger production deployment
Are pipeline configs protected?Pipeline definitions in version control with change approvalPipeline configs editable without review or audit trail
Is evidence system-generated?Logs, scan results, approval records produced automaticallyEvidence compiled manually before audits
Can exceptions be traced?Every bypass has documented approval, reason, and expiryNo exception management process; suppressions ungoverned

For a comprehensive assessment approach, see How Auditors Actually Review CI/CD Pipelines.


Core Architectural Domains

Modern regulated CI/CD architectures rely on four foundational domains. Each domain addresses a distinct control objective that auditors verify independently.

1. Enforcement Layer

The enforcement layer is the control engine of the pipeline. It determines whether security is advisory or mandatory.

It ensures:

  • Mandatory approval workflows — no deployment without authorised review
  • Blocking policy gates — critical SAST/DAST/SCA findings prevent release
  • Secure build and artifact validation — signed, verified, traceable
  • Role-based deployment permissions — segregation of duties enforced by design
  • Exception governance with audit trails — every override documented and time-limited

Without enforcement, CI/CD becomes advisory. With enforcement, CI/CD becomes regulated.

Auditor insight: Ask to see a recent deployment that was blocked by a policy gate. If the organisation cannot produce one, enforcement may not be real.

Deep dives:

2. Secure SDLC Integration

Architecture must integrate security from plan to runtime — the shift-left principle embedded in pipeline design.

SDLC PhaseSecurity ControlEvidence Produced
PlanThreat modelling, security requirementsThreat model documents, security stories
CodeSAST, secrets scanning, code reviewScan logs, review approval records
BuildSCA, SBOM generation, artifact signingDependency reports, SBOM files, signatures
TestDAST, penetration testingDAST reports, test evidence
ReleasePolicy gate evaluation, approval workflowsGate pass/fail logs, approval records
DeployConfiguration validation, environment parityDeployment logs, config checksums
MonitorRuntime protection, incident detectionAlert logs, incident records

Secure SDLC is not a compliance slogan — it is an architectural pattern.

Deep dives:

3. Continuous Compliance Model

Regulated environments require compliance that is continuous, not periodic. The architecture must produce evidence automatically on every pipeline execution.

  • Repeatable control execution — same controls, every time, every pipeline
  • Evidence-by-design — logs, reports, and approval records generated as a byproduct of normal operations
  • Automated traceability — every deployment traceable to a specific commit, review, scan, and approval
  • Framework mapping — controls mapped to DORA, NIS2, ISO 27001, SOC 2, PCI DSS

A mature architecture produces compliance continuously — not quarterly.

Deep dives:

4. Security Domain Separation

Confusion often arises between overlapping security domains. Clear architecture prevents duplication and control gaps.

DomainFocusKey Concern for AuditorsHub Page
CI/CD GovernancePipeline controls, enforcement, accessAre controls mandatory and non-bypassable?Explore
Application SecurityCode-level controls (SAST, DAST, SCA)Is security testing integrated and enforced?Explore
DevSecOpsOperating models, roles, governanceWho owns security? How are decisions escalated?Explore
Regulatory FrameworksCompliance mapping and assuranceDo controls satisfy regulatory requirements?Explore
Audit & EvidenceEvidence validation, assessmentIs evidence trustworthy, complete, and retained?Explore

Understanding these domains prevents duplication and control gaps. Architecture ensures each domain has clear boundaries and responsibilities.

Deep dive: Security Domains Explained


Architectural Maturity Model

Regulated CI/CD systems typically evolve across four stages. Auditors can use this model to quickly assess an organisation’s maturity level.

LevelNameCharacteristicsRegulatory Readiness
1AutomationPipelines automate builds and deployments. Controls are optional. No evidence generation.Not audit-ready. Significant gaps across all frameworks.
2Security IntegrationSecurity tools integrated (SAST/DAST/SCA). Results advisory, not blocking. Some logging.Partially compliant. Evidence exists but enforcement is inconsistent.
3Enforced ControlsCritical controls block non-compliant releases. Segregation of duties. Systematic evidence.Audit-ready for most frameworks. Meets DORA/NIS2/ISO 27001 minimums.
4Regulated SystemFull traceability. Policy-as-code. Continuous compliance. Exit readiness. Predictive risk.Exceeds requirements. Continuous assurance model.

Regulated environments must operate at Level 3 or higher. Most regulatory frameworks (DORA, NIS2, ISO 27001) effectively require Level 3 as a minimum for certification or compliance.

For a structured self-assessment tool, see the DevSecOps Maturity Assessment Framework.


Architecture vs Tooling

Tools do not create architecture. Architecture defines how tools are governed.

Architecture DecidesTools Implement
Which controls are mandatoryHow scans are executed
Where enforcement occurs in the pipelineWhich vulnerabilities are detected
Which failures block releasesHow results are reported
How evidence is retained and protectedWhere logs are stored
Who can override policiesHow exceptions are technically processed

A strong architecture can change tools without losing control. A weak architecture depends entirely on vendor defaults.

For auditor guidance on tool governance, see CI/CD Security Tooling — Auditor’s Guide to Tool Categories and Controls.


Architecture & Regulatory Alignment

A well-designed CI/CD architecture supports multiple regulatory frameworks simultaneously. Rather than adapting architecture per regulation, design architecture once — map controls many times.

FrameworkArchitectural RequirementKey Articles/ControlsDeep Dive
DORAICT risk management, third-party control, resilience testingArt. 9, 21, 28Art. 21 Deep Dive
NIS2Supply chain security, incident readiness, risk managementArt. 21Art. 21 Controls Mapping
ISO 27001Change management, access control, secure developmentA.8.25, A.8.28, A.8.29Annex A Mapping
SOC 2Logical access, system operations, change managementCC6, CC7, CC8TSC Mapping
PCI DSSSecure development, access control, logging, testingReq. 6, 7, 8, 10, 11Req. 6 Deep Dive

For cross-framework analysis, see the ISO 27001 vs DORA vs NIS2 Controls Overlap Matrix.


Related Architecture Deep Dives


Final Principle

In regulated environments, delivery speed and control are not opposites. The right architecture makes them compatible.

If your pipeline is not designed as a control system, compliance will always be reactive. If your architecture enforces policy by design, compliance becomes continuous.


Related for Auditors

New to CI/CD auditing? Start with our Auditor’s Guide.