CI/CD Article 28 Red Flags — Audit Checklist

This checklist highlights common CI/CD-related red flags under DORA Article 28.

Each item represents a situation frequently identified during audits as a third-party ICT risk failure.

If one or more items apply, auditors may classify the CI/CD platform or supplier as high-risk or non-compliant.

CI/CD Red Flags — DORA Article 28 (Third-Party Risk) Enterprise CI/CD diagram highlighting common DORA Article 28 third-party risk red flags: missing exit plan, shared runners, lack of sub-processor visibility, missing audit rights, and missing evidence retention. CI/CD Red Flags — DORA Article 28 Third-party risk failures auditors frequently flag in Git, CI/CD SaaS, runners, registries, and cloud runtime. CROSS-CUTTING (ARTICLE 28) Supplier governance Audit rights Exit strategy Evidence retention Git Hosting GitHub / GitLab SaaS No audit rights CI/CD SaaS Orchestrator No exit plan CI Runners Cloud execution Shared runners Registries Artifacts + images No retention Cloud Runtime Prod services No sub-processor view ENGINEER REMEDIATION HINTS Tested exit strategy (CI/CD) Dedicated / isolated runners Supplier + sub-processor map Centralized logs + retention Auditor rule: if controls cannot produce time-bound evidence on demand, they are treated as ineffective under Article 28. Focus areas: CI/CD platform scope, contractual auditability, runner isolation, sub-processor governance, and evidence retention.
Enterprise CI/CD diagram highlighting common DORA Article 28 third-party risk red flags: missing exit plan, shared runners, lack of sub-processor visibility, missing audit rights, and missing evidence retention.

CI/CD Third-Party Red Flags Checklist (Quick Review)

Governance & Exit Strategy

  • ⬜ No documented exit plan for CI/CD SaaS platforms
  • ⬜ Exit plan exists but has never been tested technically
  • ⬜ No ability to export historical CI/CD logs and artifacts
  • ⬜ Pipelines cannot be redeployed on an alternative platform

CI/CD Infrastructure & Isolation

  • ⬜ CI jobs run on shared or multi-tenant runners without clear isolation guarantees
  • ⬜ Runner isolation mechanisms are undocumented or unknown
  • ⬜ CI execution environment is controlled entirely by the provider
  • ⬜ Secrets are exposed to third-party execution contexts

Supplier & Sub-Processor Visibility

  • ⬜ CI/CD SaaS provider is not listed in the ICT third-party inventory
  • ⬜ Sub-processors (cloud, runners, registries) are not identified
  • ⬜ No risk classification for CI/CD-related third parties
  • ⬜ Supplier criticality does not influence applied controls

Contractual & Legal Controls

  • ⬜ CI/CD contracts do not include audit or inspection rights
  • ⬜ Audit rights exist but are not practically enforceable
  • ⬜ No contractual incident notification SLA
  • ⬜ Exit and termination clauses are missing or unclear

Evidence & Auditability

  • ⬜ CI/CD logs are retained for a short or undefined period
  • ⬜ Approval and change records are not traceable
  • ⬜ Artifact metadata and provenance are missing
  • ⬜ Evidence is collected manually only during audits

CI/CD Governance & Policy Enforcement

  • ⬜ No approval gates for pipeline changes
  • ⬜ Unrestricted use of marketplace plugins or actions
  • ⬜ No version pinning or review for third-party CI/CD components
  • ⬜ Controls vary across pipelines without justification

Auditor-Style Checklist (Yes / No)

CheckpointYesNo
CI/CD platforms are included in the ICT third-party inventory
CI/CD suppliers are risk-classified
Exit strategies exist and are technically feasible
CI runners are isolated and controlled
Sub-processors are identified and governed
Audit rights are contractually defined
Incident notification SLAs are in place
CI/CD logs are retained and protected
Approvals and policy gates are enforced
Evidence can be produced on demand

Red Flags Explained (Audit Interpretation)

Red FlagWhy Auditors CareExpected Control
No exit planVendor lock-in riskTested technical exit strategy
Shared runnersConfidentiality & integrity riskIsolated or dedicated runners
No sub-processor visibilityHidden risk exposureFull supply chain mapping
No audit rightsNo independent verificationEnforceable audit clauses
No evidence retentionControls cannot be provenAutomated log retention

How Auditors Use This Checklist

Auditors do not expect zero risk.

They expect:

  • risks to be identified,
  • controls to be enforced,
  • evidence to be available and consistent.

Multiple unchecked items in the same category often result in:

  • high-risk classification,
  • remediation plans,
  • follow-up audits.

How to Use This Checklist Internally

Recommended usage:

  • run it before an audit,
  • run it after onboarding a new CI/CD provider,
  • include it in third-party risk reviews,
  • link it to your CI/CD Security Checklist and Evidence Pack.

Related Content


Audit-ready context

Written for regulated environments: controls before tools, policy enforcement in CI/CD, and evidence-by-design for audits.

Focus areas include traceability, approvals, exception governance, and evidence retention across build, release, and operations.

See methodology on the About page.