DORA Article 28 Red Flags: Common Third-Party Risk Failures in CI/CD

DORA Article 28 failures rarely come from missing policies.

They come from hidden weaknesses in third-party–dependent CI/CD pipelines that surface only during audits or incidents.

Auditors look for red flags — signals that third-party ICT risk is unmanaged, unenforced, or unsupported by evidence.

CI/CD platforms are a frequent source of such findings because they combine external services, privileged execution, and automation.

This article highlights the most common Article 28 red flags related to CI/CD pipelines, why they matter, and how auditors interpret them.

CI/CD Red Flags — DORA Article 28 (Third-Party Risk) Enterprise CI/CD diagram highlighting common DORA Article 28 third-party risk red flags: missing exit plan, shared runners, lack of sub-processor visibility, missing audit rights, and missing evidence retention. CI/CD Red Flags — DORA Article 28 Third-party risk failures auditors frequently flag in Git, CI/CD SaaS, runners, registries, and cloud runtime. CROSS-CUTTING (ARTICLE 28) Supplier governance Audit rights Exit strategy Evidence retention Git Hosting GitHub / GitLab SaaS No audit rights CI/CD SaaS Orchestrator No exit plan CI Runners Cloud execution Shared runners Registries Artifacts + images No retention Cloud Runtime Prod services No sub-processor view ENGINEER REMEDIATION HINTS Tested exit strategy (CI/CD) Dedicated / isolated runners Supplier + sub-processor map Centralized logs + retention Auditor rule: if controls cannot produce time-bound evidence on demand, they are treated as ineffective under Article 28. Focus areas: CI/CD platform scope, contractual auditability, runner isolation, sub-processor governance, and evidence retention.
Enterprise CI/CD diagram highlighting common DORA Article 28 third-party risk red flags: missing exit plan, shared runners, lack of sub-processor visibility, missing audit rights, and missing evidence retention.

Why CI/CD Red Flags Matter Under Article 28

Under DORA, third-party risk is not theoretical.

Auditors assess whether a failure at a third-party provider could:

  • disrupt critical services,
  • compromise system integrity,
  • or prevent regulatory obligations from being met.

CI/CD pipelines are often single points of failure in software delivery.

Red flags in this area are therefore treated as high-severity findings.


Red Flag #1 — No Exit Plan from CI/CD SaaS Platforms

What auditors observe

Organizations rely heavily on CI/CD SaaS platforms but cannot demonstrate:

  • how to migrate pipelines,
  • how to retrieve historical logs and artifacts,
  • how to maintain continuity if the provider becomes unavailable.

Why this is a red flag

DORA Article 28 explicitly requires exit strategies for critical ICT third-party providers.

An exit plan that exists only on paper — without technical feasibility — is considered insufficient.

Typical auditor conclusion

“The organization is operationally locked-in to a critical ICT provider.”


Red Flag #2 — Shared CI Runners Across Tenants

What auditors observe

CI jobs execute on:

  • shared runners,
  • multi-tenant infrastructure,
  • with limited visibility into isolation controls.

Often, organizations cannot explain:

  • how runner isolation is enforced,
  • who controls the execution environment,
  • whether data leakage is technically prevented.

Why this is a red flag

Shared runners increase:

  • confidentiality risk,
  • integrity risk,
  • lateral movement exposure.

Under Article 28, this raises questions about supplier risk classification and control effectiveness.


Red Flag #3 — No Visibility on Sub-Processors

What auditors observe

Organizations:

  • contract with a primary CI/CD or Git provider,
  • but lack visibility into sub-processors (cloud providers, runners, registries, monitoring services).

Supplier inventories often stop at the first level.

Why this is a red flag

DORA Article 28 requires oversight not only of direct providers, but also of critical sub-contracting chains.

Lack of sub-processor visibility indicates:

  • incomplete risk assessment,
  • insufficient supplier governance.

Red Flag #4 — No Audit Rights in CI/CD Contracts

What auditors observe

Contracts with CI/CD or Git SaaS providers:

  • lack audit or inspection clauses,
  • or contain audit rights that are practically unusable.

In some cases, engineering teams are unaware of contractual limitations.

Why this is a red flag

Without audit rights:

  • controls cannot be independently verified,
  • reliance on supplier assurances becomes unavoidable.

Auditors treat this as a structural compliance gap, not a procedural oversight.


Red Flag #5 — No Evidence Retention for CI/CD Activities

What auditors observe

CI/CD platforms generate logs, approvals, and execution traces, but:

  • logs are retained for short periods,
  • evidence is overwritten or inaccessible,
  • retention policies are undefined.

Evidence is often collected after audit notification, not continuously.

Why this is a red flag

DORA Article 28 is evidence-driven.

If evidence cannot be produced on demand, controls are considered ineffective.

This red flag frequently results in:

  • audit observations,
  • remediation plans,
  • follow-up reviews.

Additional CI/CD Red Flags Auditors Commonly Identify

  • Unrestricted use of CI/CD marketplace plugins
  • No approval gates for pipeline changes
  • Secrets exposed to third-party execution contexts
  • No monitoring of CI/CD platform availability
  • Inconsistent control enforcement across pipelines

Each of these points weakens confidence in third-party risk management.


How Auditors Use Red Flags

Red flags are rarely evaluated in isolation.

Auditors look for patterns:

  • multiple red flags around the same provider,
  • gaps between contracts and technical enforcement,
  • missing links between controls and evidence.

When patterns emerge, auditors may:

  • escalate supplier criticality,
  • expand audit scope,
  • request remediation within strict timelines.

How to Address These Red Flags Proactively

Organizations that perform well under Article 28 typically:

  • explicitly scope CI/CD platforms as ICT third parties,
  • enforce controls through pipeline configuration,
  • align contracts with technical reality,
  • generate continuous, immutable evidence.

Most importantly, they treat CI/CD security as part of third-party risk governance, not just DevOps tooling.


Key Takeaway

CI/CD pipelines are among the most common sources of Article 28 audit findings.

Red flags such as:

  • lack of exit strategies,
  • weak isolation,
  • missing audit rights,
  • insufficient evidence retention

signal unmanaged third-party risk.

Addressing these issues early transforms CI/CD pipelines from audit liabilities into strong compliance assets.


Related Content


Audit-ready context

Written for regulated environments: controls before tools, policy enforcement in CI/CD, and evidence-by-design for audits.

Focus areas include traceability, approvals, exception governance, and evidence retention across build, release, and operations.

See methodology on the About page.