CI/CD Red Flags by Regulation — Explained

How DORA, NIS2, and ISO 27001 Auditors Interpret the Same Pipeline Differently

CI/CD pipelines are increasingly central to regulatory compliance, but not all regulations assess them the same way. While the technical tooling may be identical, auditors interpret risks, controls, and weaknesses differently depending on the regulatory framework.

This article explains how CI/CD red flags vary across DORA, NIS2, and ISO 27001, and why understanding these differences is essential for avoiding audit findings.

CI/CD Red Flags by Regulation Comparison of CI/CD red flags as assessed under DORA, NIS2, and ISO 27001, highlighting differences in audit focus and regulatory expectations. CI/CD Red Flags by Regulation Same pipeline • Different regulatory expectations DORA Operational resilience & ICT governance Critical Red Flags CI/CD not classified as regulated ICT system Missing approval evidence for production changes Weak segregation of duties in pipelines Incomplete traceability commit → prod Evidence not retained for supervision periods NIS2 Cybersecurity risk management Common Red Flags CI/CD excluded from supply chain scope Supplier risk assessments missing or outdated Weak dependency and supply chain visibility Incident response not covering suppliers Inadequate monitoring of CI/CD activities ISO 27001 ISMS & control effectiveness Typical Red Flags Controls documented but not enforced Lack of repeatable change management process No evidence of control effectiveness Logs exist but are not reviewed Evidence scattered and inconsistent
The diagram below illustrates how the same CI/CD pipeline is interpreted differently by auditors depending on the regulatory framework.

Why CI/CD Red Flags Are Regulation-Specific

At a technical level, CI/CD pipelines enforce:

  • access control
  • change management
  • security testing
  • deployment automation

However, regulations focus on different risk objectives:

  • DORA prioritizes operational resilience and supervisory control
  • NIS2 prioritizes cybersecurity risk management and supply chain security
  • ISO 27001 prioritizes control effectiveness within an ISMS

As a result, the same CI/CD weakness can be:

  • a major non-compliance under DORA
  • a risk management gap under NIS2
  • a control maturity issue under ISO 27001

DORA: CI/CD as a Regulated ICT System

How auditors think

Under DORA, CI/CD pipelines are treated as regulated ICT systems, not just engineering tools.

Auditors ask:

Is the pipeline enforcing governance, traceability, and resilience continuously?

Typical CI/CD red flags under DORA

  • CI/CD pipelines not formally classified as ICT assets
  • Production changes performed outside pipelines
  • Missing or incomplete approval evidence
  • Weak segregation of duties in pipeline configuration
  • Inability to reproduce historical deployment evidence

Why these are critical

DORA expects continuous, system-generated evidence. If CI/CD pipelines allow exceptions, manual steps, or undocumented changes, auditors consider this a systemic governance failure, not a technical oversight.


NIS2: CI/CD as Part of the Supply Chain Risk

How auditors think

Under NIS2, CI/CD pipelines are evaluated as part of the software and ICT supply chain.

Auditors ask:

Are CI/CD risks identified, governed, and managed proportionally?

Typical CI/CD red flags under NIS2

  • CI/CD platforms excluded from supplier inventories
  • Lack of supplier risk assessments for CI/CD providers
  • Poor visibility into dependencies and third-party integrations
  • Incident response plans that ignore CI/CD or suppliers
  • Weak monitoring of pipeline activity

Why these matter

NIS2 focuses on risk awareness and preparedness. Auditors expect CI/CD risks to be known, documented, and governed, even if controls are not as strict as under DORA.

Ignoring CI/CD in the supply chain scope is one of the most common NIS2 findings.


ISO 27001: CI/CD as a Control Effectiveness Test

How auditors think

ISO 27001 auditors assess whether CI/CD pipelines demonstrate effective control implementation within the ISMS.

Auditors ask:

Are documented controls actually enforced and monitored?

Typical CI/CD red flags under ISO 27001

  • CI/CD controls documented but not technically enforced
  • Change management processes inconsistently applied
  • Logs collected but not reviewed
  • Evidence scattered across tools and teams
  • No demonstration of control effectiveness

Why these matter

ISO 27001 is less prescriptive but highly focused on evidence of effectiveness. A well-documented process without reliable CI/CD enforcement is often considered insufficient.


Comparing Red Flags Across Regulations

AreaDORANIS2ISO 27001
CI/CD roleRegulated ICT systemSupply chain componentControl mechanism
Manual deploymentsCritical findingRisk management gapControl weakness
Approval traceabilityMandatoryExpectedEffectiveness indicator
Evidence modelContinuousProportionalISMS-based
Audit strictnessVery highHighModerate

Practical Takeaways for Organizations

  • DORA compliance requires “pipeline-first” governance
  • NIS2 compliance requires CI/CD to be in scope and risk-managed
  • ISO 27001 compliance requires CI/CD to prove controls work

Organizations subject to multiple frameworks should design DORA-grade CI/CD pipelines, as they generally satisfy NIS2 and ISO 27001 expectations with minimal adaptation.


How to Reduce CI/CD Red Flags Across All Regulations

The most effective strategies include:

  • enforcing mandatory CI/CD usage for production
  • implementing non-bypassable approvals
  • centralizing logs and evidence retention
  • treating CI/CD as a critical system, not a convenience
  • aligning governance documentation with technical enforcement

These measures significantly reduce audit pressure regardless of the regulatory framework.


Conclusion

CI/CD red flags are not universal—they are contextual to the regulation being applied. Understanding how auditors interpret CI/CD pipelines under DORA, NIS2, and ISO 27001 allows organizations to anticipate findings and design more resilient, compliant delivery architectures.

CI/CD pipelines that enforce controls technically and generate continuous evidence are best positioned to pass audits across all regulatory frameworks.


Related Content


Audit-ready context

Written for regulated environments: controls before tools, policy enforcement in CI/CD, and evidence-by-design for audits.

Focus areas include traceability, approvals, exception governance, and evidence retention across build, release, and operations.

See methodology on the About page.