Digital Operational Resilience Act (DORA) β CI/CD & ICT Risk in Regulated Environments
The Digital Operational Resilience Act (DORA) establishes a unified framework for managing ICT risk in the European financial sector.
It applies to:
- Banks
- Insurance companies
- Investment firms
- Payment institutions
- Crypto-asset service providers
- Critical ICT third-party providers
DORA does not regulate code.
It regulates operational resilience.
CI/CD pipelines, cloud infrastructure, and third-party ICT services fall directly within its scope.
Why DORA Matters for CI/CD
In regulated financial environments, CI/CD pipelines are part of the ICT system.
This means they must:
- Enforce access controls
- Segregate duties
- Protect production environments
- Generate audit evidence
- Manage third-party risk
- Support incident response and recovery
DORA transforms CI/CD from a delivery tool into a regulated control system.
The Two Critical DORA Pillars for CI/CD
While DORA contains multiple chapters, two areas are particularly relevant for CI/CD and cloud architectures:
1. Article 21 β ICT Risk Management & Control Framework
Article 21 requires financial entities to implement robust ICT risk management controls.
For CI/CD, this translates into:
- Secure change management
- Controlled deployments
- Segregation of duties
- Access governance
- Logging and traceability
- Evidence retention
- Secure development lifecycle enforcement
CI/CD must support:
- Risk-based approvals
- Mandatory policy gates
- Blocking security controls
- Traceable change history
π Related guides:
- DORA Article 21 β Deep Dive
- DORA Article 21 β CI/CD Controls Mapping
- DORA Article 21 β Auditor Checklist
- DORA Article 21 β Evidence Pack
2. Article 28 β ICT Third-Party Risk Management
Article 28 focuses on third-party ICT service providers.
For modern CI/CD ecosystems, this includes:
- Git hosting platforms
- CI/CD SaaS providers
- Artifact registries
- Cloud runtime environments
- Marketplace plugins and integrations
Article 28 requires:
- Formal supplier risk assessment
- Contractual security clauses
- Audit rights
- Exit strategies
- Resilience testing
- Ongoing monitoring
If your pipeline runs on SaaS infrastructure, you are managing third-party ICT risk.
π Related guides:
- DORA Article 28 β Explained
- DORA Article 28 β Architecture
- DORA Article 28 β Auditor Checklist
- DORA Article 28 β Evidence Pack
- DORA Article 28 β Exit Strategy Testing
DORA & CI/CD Architecture
A DORA-aligned architecture must:
- Enforce mandatory approval workflows
- Prevent direct production access
- Block non-compliant builds
- Sign and trace artifacts
- Retain deployment logs
- Monitor runtime events
- Isolate privileged access
DORA compliance is not achieved by documentation alone.
It requires architectural enforcement.
DORA & Continuous Compliance
DORA expects controls to operate continuously β not periodically.
CI/CD can support this by:
- Automating policy enforcement
- Generating tamper-resistant logs
- Recording approval chains
- Preserving deployment traceability
- Tracking third-party service usage
When designed correctly, the pipeline becomes a compliance engine.
DORA vs Other Frameworks
DORA overlaps with:
- ISO 27001 (Annex A controls)
- SOC 2 (Logical Access & Change Management)
- NIS2 (Supply chain resilience)
- PCI DSS (Secure development & access control)
However, DORA is regulation β not a voluntary certification.
It introduces supervisory expectations and enforcement mechanisms.
Common DORA Misconceptions
β βDORA is only about cybersecurity.β
DORA covers operational resilience, including governance, monitoring, and third-party management.
β βCloud providers handle DORA compliance.β
Financial entities remain accountable, even when using third-party ICT providers.
β βHaving security tools equals compliance.β
Without enforced governance and evidence, tools alone are insufficient.
DORA Maturity Model for CI/CD
Organizations typically fall into one of four categories:
Level 1 β Informal Controls
Manual approvals, inconsistent logging.
Level 2 β Tool-Based Security
Security tools integrated but not blocking.
Level 3 β Enforced CI/CD Controls
Policy gates block non-compliant releases.
Level 4 β Regulated ICT System
Full segregation of duties, traceability, evidence retention, and third-party governance.
Financial institutions should aim for Level 3 or Level 4.
Practical DORA Resources
Architecture:
- DORA Compliance Architecture β Explained
- DORA Compliance Architecture: CI/CD as a Regulated ICT System
Article 21:
- DORA Article 21 β Deep Dive
- DORA Article 21 β Controls Mapping
- DORA Article 21 β Evidence Pack
Article 28:
- DORA Article 28 β Architecture
- DORA Article 28 β Exit Strategy Testing
- Third-Party Risk in CI/CD under DORA
Audit & Governance:
- Executive Audit Briefing β CI/CD in Regulated Environments
- Audit Day Playbook
- How Auditors Actually Review CI/CD Pipelines
Final Principle
DORA is not a documentation exercise.
It is an operational resilience mandate.
In modern financial institutions, CI/CD pipelines are part of the regulated ICT perimeter.
If your architecture enforces controls and generates evidence by design, DORA becomes manageable.
If controls are manual or informal, DORA becomes a systemic risk.