DORA Article 28 — Auditor Checklist (Yes / No / Evidence)
This checklist is designed for formal audit reviews of ICT third-party risk management under DORA Article 28. Each control must be objectively verifiable through evidence. 1. ICT Third-Party Inventory Control Yes No Evidence A complete inventory of ICT third-party providers exists ☐ ☐ Supplier register CI/CD platforms are included as ICT providers ☐ ☐ Supplier … Read more