DORA Article 28 Evidence Pack — Auditor View vs Engineer View

Why This Split Matters

One of the most common causes of friction during DORA Article 28 audits is a mismatch of expectations.

  • Auditors think in terms of control objectives, evidence, and accountability.
  • Engineers think in terms of systems, pipelines, configurations, and automation.

Both views are valid — but they are not interchangeable.

This article bridges that gap by showing:

  • what auditors are actually trying to verify,
  • how engineers should implement controls to satisfy those expectations,
  • and where misunderstandings typically occur.

High-Level Perspective

PerspectiveFocus
Auditor ViewCan this organization demonstrate effective third-party ICT risk control?
Engineer ViewHow do we enforce and generate evidence through CI/CD and cloud systems?

1. Supplier Inventory & Criticality

Auditor View

Auditors ask:

  • Do you have a complete inventory of ICT third-party providers?
  • Are providers classified by criticality?
  • Is this classification tied to business services and delivery systems?

What they verify:

  • inventory completeness,
  • consistency with actual systems in use,
  • traceability to risk management decisions.

Engineer View

Engineers must ensure:

  • CI/CD platforms, Git hosting, registries, runners, cloud services are explicitly registered as suppliers,
  • supplier metadata (criticality, owner, usage) is kept in sync with real usage,
  • pipelines reference approved suppliers only.

Typical implementation:

  • CMDB or supplier registry linked to CI/CD tooling,
  • automated checks preventing unapproved services,
  • documentation generated from live configurations.

2. Contractual Controls & Audit Rights

Auditor View

Auditors look for:

  • enforceable audit rights,
  • incident notification obligations,
  • evidence retention commitments,
  • visibility over subprocessors,
  • defined exit clauses.

They do not assume contracts are effective just because they exist.

Engineer View

Engineers must:

  • know which contractual obligations impact technical controls,
  • ensure platforms can actually produce the required evidence,
  • support audits without ad-hoc data collection.

Typical implementation:

  • mapping contract clauses → technical controls,
  • ensuring logs, SBOMs, approvals are retained long enough,
  • making audit access technically possible (read-only, scoped).

3. CI/CD & Cloud Control Enforcement

Auditor View

Auditors want proof that:

  • access is controlled and segregated,
  • approvals are enforced,
  • artifacts are protected against tampering,
  • third-party tooling does not bypass internal controls.

They test whether controls are systematic, not manual.

Engineer View

Engineers implement:

  • IAM, role separation, branch protections,
  • pipeline approvals and policy gates,
  • SBOM generation and artifact signing,
  • runner isolation and token scoping.

Key mindset shift:

“Secure by default” is not enough — controls must be provable.


4. Monitoring & Incident Management

Auditor View

Auditors assess whether:

  • third-party services are continuously monitored,
  • incidents involving suppliers are detectable,
  • incident handling is documented and traceable.

They reject:

  • annual risk assessments without operational monitoring.

Engineer View

Engineers ensure:

  • CI/CD platforms, registries, and cloud runtimes emit logs,
  • monitoring feeds SIEM or centralized logging,
  • incidents reference affected third-party providers.

Typical implementation:

  • observability pipelines,
  • incident tickets linked to logs and metrics,
  • alerting on supplier degradation or failure.

5. Exit Strategy & Resilience

Auditor View

Auditors ask:

  • Do exit strategies exist for critical suppliers?
  • Have they been tested?
  • Could you realistically exit under pressure?

A PDF exit plan alone is insufficient.

Engineer View

Engineers support exit strategies by:

  • avoiding hard vendor lock-in,
  • documenting replacement or fallback paths,
  • participating in DR and exit tests.

Typical implementation:

  • artifact portability,
  • infrastructure-as-code reproducibility,
  • tested backup and restore procedures.

Common Misalignment Patterns

SituationAuditor Reaction
“We trust this SaaS provider”❌ Not acceptable
Evidence collected manually before audit⚠️ Weak control
Logs exist but are not retained❌ Non-compliant
Exit plan never tested❌ High-risk finding

Designing for Both Views

The most mature organizations:

  • design controls once,
  • satisfy both audit and engineering needs,
  • generate evidence continuously via CI/CD and cloud platforms.

This is the foundation of continuous compliance under DORA.


Final Takeaway

DORA Article 28 compliance fails when:

  • auditors expect evidence,
  • and engineers provide explanations.

It succeeds when:

  • engineers design systems that produce evidence by default,
  • and auditors can verify controls without interpretation.

Recommended Related Reading


Audit-ready context

Written for regulated environments: controls before tools, policy enforcement in CI/CD, and evidence-by-design for audits.

Focus areas include traceability, approvals, exception governance, and evidence retention across build, release, and operations.

See methodology on the About page.