ISO 27001 A.14 Deep Dive — System Development and Maintenance in CI/CD

Introduction: Why A.14 Is the Cornerstone Control for CI/CD

Annex A.14 — System Acquisition, Development and Maintenance — is the single most relevant control domain for organisations operating CI/CD pipelines. It directly governs how systems are developed, changed, tested, and accepted into production. For auditors and compliance officers, A.14 is where you will find the greatest density of CI/CD-specific control requirements and, often, the greatest density of non-conformities.

This deep dive examines every A.14 sub-control in the context of CI/CD pipelines, providing clear guidance on what compliance looks like, what evidence is required, and what constitutes a red flag during audit.

A.14.1 — Security Requirements of Information Systems

A.14.1.1 — Information Security Requirements Analysis and Specification

What it means for CI/CD: Before any system is developed or acquired, security requirements must be defined. In a CI/CD context, this means that security requirements are specified before development begins and are traceable through the pipeline — from requirements definition through to deployment verification.

Evidence demonstrating compliance:

  • Security requirements documented in user stories, acceptance criteria, or dedicated security requirement specifications
  • Traceability from security requirements to pipeline-enforced test cases
  • Records showing security requirements were reviewed and approved before development commenced

What non-compliance looks like: Security requirements are absent, informal, or added retroactively after development. No linkage between stated requirements and automated verification in the pipeline.

A.14.1.2 — Securing Application Services on Public Networks

What it means for CI/CD: Applications deployed through CI/CD pipelines to public-facing environments must have controls for data integrity, confidentiality, and non-repudiation. The pipeline itself must verify that TLS configurations, API security controls, and authentication mechanisms are properly configured before deployment.

Evidence demonstrating compliance:

  • Pipeline stages that verify TLS configuration and certificate validity
  • Automated checks for security headers and transport security
  • Records of security configuration verification prior to public deployment

What non-compliance looks like: Applications deployed to public networks without automated security configuration verification. No pre-deployment checks for transport security.

A.14.1.3 — Protecting Application Services Transactions

What it means for CI/CD: Where applications handle transactions, the pipeline must include verification that transaction integrity controls (complete transmission, routing validation, message integrity, confidentiality) are in place and tested.

Evidence demonstrating compliance:

  • Integration test suites covering transaction integrity scenarios executed in the pipeline
  • Records of transaction security testing results retained with pipeline execution history

What non-compliance looks like: Transaction-handling applications deployed without integration testing of transaction security controls.

A.14.2 — Security in Development and Support Processes

A.14.2.1 — Secure Development Policy

What it means for CI/CD: The organisation must have a documented policy governing secure development practices. In CI/CD environments, this policy must address automated build and deployment processes, pipeline security controls, and the integration of security testing into the delivery pipeline.

Evidence demonstrating compliance:

  • Approved secure development policy explicitly covering CI/CD processes
  • Policy review records showing regular updates
  • Evidence of policy communication to all pipeline users and administrators
  • Training records for personnel involved in pipeline management

What non-compliance looks like: Secure development policy exists but makes no reference to CI/CD pipelines or automated processes. Policy has not been reviewed since CI/CD adoption.

A.14.2.2 — System Change Control Procedures

What it means for CI/CD: This is a pivotal control for CI/CD. All changes to systems must follow formal change control procedures. In CI/CD, the pipeline is the change control mechanism — but it must enforce documented procedures including approval requirements, impact assessment, testing verification, and rollback capability.

Evidence demonstrating compliance:

  • Change control procedures that reference the CI/CD pipeline as the enforcement mechanism
  • Pipeline configurations showing mandatory approval gates before production deployment
  • Audit trails of all changes including who initiated, who approved, what was tested, and deployment outcome
  • Evidence that emergency change procedures are defined and followed (with retrospective approval)

What non-compliance looks like: Developers can push changes directly to production bypassing the pipeline. No approval gates in the pipeline. Emergency changes have no retrospective review process.

A.14.2.3 — Technical Review of Applications After Operating Platform Changes

What it means for CI/CD: When the underlying platform changes (operating system updates, middleware upgrades, infrastructure changes), applications must be reviewed and tested. CI/CD pipelines should trigger regression testing when platform dependencies change.

Evidence demonstrating compliance:

  • Documented procedure for platform change impact assessment
  • Records of regression test executions triggered by platform changes
  • Evidence that pipeline base images and platform dependencies are version-controlled with change tracking

What non-compliance looks like: Platform changes are made without triggering application regression testing. No tracking of platform dependency versions in the pipeline.

A.14.2.4 — Restrictions on Changes to Software Packages

What it means for CI/CD: Modifications to vendor-supplied or third-party software packages must be controlled and limited. In CI/CD, this covers modifications to open-source components, forked dependencies, and customised third-party integrations.

Evidence demonstrating compliance:

  • Policy defining when third-party package modification is permitted
  • Approval records for any modifications to third-party packages
  • Pipeline controls that detect and flag modified packages (integrity verification, checksum validation)
  • Vendor notification and support impact assessments for modified packages

What non-compliance looks like: Third-party packages are routinely forked or modified without formal approval. No integrity checking in the pipeline for package modifications.

A.14.2.5 — Secure System Engineering Principles

What it means for CI/CD: The organisation must establish, document, and apply secure engineering principles to all system development. The CI/CD pipeline should enforce these principles through automated checks — architecture reviews, security pattern validation, and compliance verification.

Evidence demonstrating compliance:

  • Documented secure engineering principles applicable to CI/CD-delivered systems
  • Pipeline-enforced checks that validate adherence to engineering principles
  • Architecture review records for new systems entering the pipeline
  • Evidence that secure engineering principles are reviewed and updated periodically

What non-compliance looks like: Secure engineering principles exist on paper but are not enforced through the pipeline. No automated verification of security architecture patterns.

A.14.2.6 — Secure Development Environment

What it means for CI/CD: Development environments — including CI/CD build environments — must be secured and protected. Build agents, artifact repositories, and pipeline orchestration platforms are development environments that require appropriate security controls.

Evidence demonstrating compliance:

  • Security controls applied to CI/CD build environments (network segmentation, access control, hardening)
  • Evidence of build environment isolation (ephemeral build agents, container isolation)
  • Access control records for development and build infrastructure
  • Hardening standards applied to CI/CD platform infrastructure

What non-compliance looks like: Build environments share infrastructure with production without isolation. Build agents are long-lived with accumulated state and no periodic rebuilding. No hardening standards for CI/CD infrastructure.

A.14.2.7 — Outsourced Development

What it means for CI/CD: When development is outsourced, the organisation must supervise and monitor the activity. In CI/CD, this means outsourced developers must use the organisation’s pipeline (not their own), and their contributions are subject to the same automated controls and approval processes.

Evidence demonstrating compliance:

  • Contractual requirements for outsourced developers to use the organisation’s CI/CD pipeline
  • Access control records showing outsourced developers have appropriate (limited) pipeline access
  • Evidence of code review requirements for outsourced contributions
  • Monitoring records for outsourced developer pipeline activity

What non-compliance looks like: Outsourced developers use their own build and deployment processes. Outsourced contributions bypass standard pipeline controls or code review requirements.

A.14.2.8 — System Security Testing

What it means for CI/CD: Security testing must be performed during development. CI/CD pipelines should integrate automated security testing — static analysis, dependency vulnerability scanning, dynamic testing — as mandatory pipeline stages that cannot be bypassed.

Evidence demonstrating compliance:

  • Pipeline configurations showing mandatory security testing stages
  • Security test results retained with each pipeline execution
  • Evidence that security test failures block progression to production
  • Records of security testing tool updates and rule maintenance

What non-compliance looks like: Security testing exists but is optional or advisory only. Test results are not retained. Security test failures can be overridden without documented justification.

A.14.2.9 — System Acceptance Testing

What it means for CI/CD: Acceptance testing programmes and criteria must be established. The CI/CD pipeline must enforce acceptance criteria before deployment to production — including functional, performance, and security acceptance gates.

Evidence demonstrating compliance:

  • Defined acceptance criteria for each deployment stage
  • Pipeline configurations enforcing acceptance gates
  • Records of acceptance test results for each production deployment
  • Evidence that acceptance criteria are reviewed and approved by appropriate stakeholders

What non-compliance looks like: No formal acceptance criteria defined. Pipeline allows deployment without acceptance verification. Acceptance testing is manual and inconsistently applied.

A.14 Sub-Control Mapping Table

A.14 Sub-Control CI/CD Implementation Required Evidence Red Flags
A.14.1.1 Security requirements Security requirements traced to pipeline test cases Requirements specifications; traceability records; test case mappings No security requirements defined before development begins
A.14.1.2 Public network services Pre-deployment security configuration checks Automated TLS and security header verification results Public deployments without security configuration verification
A.14.1.3 Transaction protection Transaction integrity testing in pipeline Integration test results covering transaction scenarios Transaction systems deployed without integrity testing
A.14.2.1 Secure development policy Policy governing CI/CD security practices Approved policy; review records; communication evidence Policy does not mention CI/CD; no review since pipeline adoption
A.14.2.2 Change control Pipeline as change control enforcement mechanism Approval gate configurations; change audit trails; emergency change records Direct-to-production pushes possible; no approval gates
A.14.2.3 Platform change review Regression testing triggered by platform dependency changes Platform change records; regression test results Platform updates without application regression testing
A.14.2.4 Package change restrictions Integrity verification for third-party packages Package modification approvals; integrity check results Forked packages without approval; no integrity checks
A.14.2.5 Secure engineering principles Pipeline-enforced architecture and security pattern checks Documented principles; automated verification results Principles exist on paper only; no pipeline enforcement
A.14.2.6 Secure dev environment Hardened, isolated build environments Hardening records; isolation evidence; access logs Shared infrastructure; persistent build agents; no hardening
A.14.2.7 Outsourced development Outsourced developers use organisation’s pipeline Contracts; access records; monitoring logs; code review records External developers bypassing pipeline; no monitoring
A.14.2.8 Security testing Mandatory automated security testing stages Pipeline configs; test results; tool maintenance records Optional security tests; results not retained; easy bypasses
A.14.2.9 Acceptance testing Pipeline-enforced acceptance gates Acceptance criteria; gate configurations; test results per deployment No acceptance criteria; manual-only testing; inconsistent application

How A.14 Connects to Other Annex A Controls

A.14 does not operate in isolation. Effective CI/CD governance requires understanding how A.14 intersects with other control domains:

  • A.9 (Access Control) — A.14.2.2 change control depends on A.9 access controls to ensure only authorised personnel can approve and trigger deployments. Access control failures undermine the entire change control framework.
  • A.12 (Operations Security) — A.14.2.6 secure development environment requirements align with A.12 operational procedures. Logging requirements under A.12 provide the audit trail needed to verify A.14 change control compliance.
  • A.15 (Supplier Relationships) — A.14.2.4 package restrictions and A.14.2.7 outsourced development connect directly to A.15 supplier management. Third-party components in the pipeline are both a development concern (A.14) and a supplier risk concern (A.15).

Auditor Verification Checklist for A.14

When auditing A.14 compliance in CI/CD environments, verify the following:

  • ☐ Secure development policy explicitly addresses CI/CD pipelines and automated processes
  • ☐ Security requirements are defined before development and traceable to pipeline verification
  • ☐ Change control procedures reference the CI/CD pipeline as the enforcement mechanism
  • ☐ Pipeline includes mandatory approval gates before production deployment
  • ☐ All pipeline executions produce immutable audit trails (who, what, when, outcome)
  • ☐ Security testing stages are mandatory and cannot be bypassed without documented justification
  • ☐ Security test failures block deployment progression
  • ☐ Acceptance criteria are defined, approved, and enforced by the pipeline
  • ☐ Build environments are isolated, hardened, and access-controlled
  • ☐ Outsourced development is subject to the same pipeline controls as internal development
  • ☐ Third-party package modifications are formally approved and integrity-verified
  • ☐ Platform changes trigger regression testing
  • ☐ Emergency change procedures exist with retrospective review requirements
  • ☐ Evidence is retained per the organisation’s retention policy

Further Reading


Related for Auditors

New to CI/CD auditing? Start with our Auditor’s Guide.