CI/CD Security Audit — Compliance Mapping (NIS2 / PCI DSS)

This audit table maps CI/CD security controls to NIS2 Directive requirements and PCI DSS controls.
It supports risk management, supply chain security, and audit readiness for critical and payment-related systems.


🔐 Identity & Access Management (IAM)

ControlNIS2PCI DSSYesNo
Least privilege enforced for CI/CD service accountsArt. 21(2)(b)Req. 7.2
Separation of human and pipeline identitiesArt. 21(2)(d)Req. 7.1
RBAC enforced for CI/CD systemsArt. 21(2)(b)Req. 7.2
MFA enforced for CI/CD administratorsArt. 21(2)(a)Req. 8.4
Privileged actions require approvalArt. 21(2)(d)Req. 6.4

🔑 Secrets & Credential Management

ControlNIS2PCI DSSYesNo
Secrets not stored in source codeArt. 21(2)(a)Req. 3.4
Runtime secret injectionArt. 21(2)(a)Req. 3.6
Environment-scoped credentialsArt. 21(2)(b)Req. 7.2
Regular secret rotationArt. 21(2)(c)Req. 3.6.4
Secrets excluded from logsArt. 21(2)(a)Req. 10.5

📦 Software Supply Chain & Artifact Integrity

ControlNIS2PCI DSSYesNo
Hardened CI/CD build environmentsArt. 21(2)(e)Req. 6.2
Artifact signing enforcedArt. 21(2)(e)Req. 6.3
Artifact provenance and traceabilityArt. 21(2)(e)Req. 6.4
Artifact repositories are immutableArt. 21(2)(a)Req. 6.4
Only trusted artifacts promotedArt. 21(2)(d)Req. 6.4

🔗 Third-Party & CI/CD Integrations

ControlNIS2PCI DSSYesNo
Third-party CI/CD tools formally approvedArt. 21(2)(e)Req. 12.8
Third-party actions pinned to versionsArt. 21(2)(e)Req. 6.3
Integrity of external CI/CD components verifiedArt. 21(2)(e)Req. 6.2
Community plugins restrictedArt. 21(2)(b)Req. 6.2
Integration activity monitoredArt. 21(2)(c)Req. 10.4

📊 Logging, Monitoring & Incident Readiness

ControlNIS2PCI DSSYesNo
CI/CD pipeline activity fully loggedArt. 21(2)(c)Req. 10.2
Logs include approvals and security eventsArt. 21(2)(c)Req. 10.3
Centralized logging enabledArt. 21(2)(c)Req. 10.5
Log retention aligned with policyArt. 21(2)(c)Req. 10.7
CI/CD logs support incident investigationArt. 23Req. 12.10

🛡️ Governance, Risk & Change Management

ControlNIS2PCI DSSYesNo
CI/CD included in cybersecurity risk managementArt. 21Req. 12.2
Segregation of duties enforcedArt. 21(2)(d)Req. 7.1
Change approvals enforced via pipelinesArt. 21(2)(d)Req. 6.4
Exceptions formally approved and documentedArt. 21(2)(b)Req. 12.3
CI/CD security posture reviewed periodicallyArt. 21(2)(f)Req. 12.11

How to Use This NIS2 / PCI DSS Audit Table

  • Use for NIS2 cybersecurity risk assessments
  • Support PCI DSS Requirement 6 & 10 audits
  • Demonstrate CI/CD inclusion in organizational security governance
  • Attach evidence references in the Notes column
  • Reassess after pipeline or tooling changes

Related Resources


Audit-ready context

Written for regulated environments: controls before tools, policy enforcement in CI/CD, and evidence-by-design for audits.

Focus areas include traceability, approvals, exception governance, and evidence retention across build, release, and operations.

See methodology on the About page.