DORA Article 21 ↔ CI/CD Controls Mapping

This table maps DORA Article 21 ICT risk management requirements to concrete CI/CD pipeline security controls.
It supports regulatory interpretation, audit preparation, and technical implementation reviews.


Article 21(1) — ICT Risk Management Framework

DORA RequirementCI/CD ControlEvidence Generated
Identify and assess ICT risksAutomated security testing (SAST, SCA, DAST)Scan reports, pipeline logs
Prevent and mitigate ICT risksPolicy enforcement and pipeline gatesGate decisions, approvals
Detect anomalous activitiesPipeline monitoring and alertsAlert logs, SIEM events
Respond to ICT incidentsControlled rollback and redeploymentsDeployment history
Recover from disruptionsReproducible builds and releasesBuild metadata

Article 21(2)(a) — Access Control

DORA RequirementCI/CD ControlEvidence Generated
Prevent unauthorized accessRBAC for CI/CD configurationAccess control logs
Protect privileged operationsLeast privilege service accountsIAM policies
Secure administrative accessMFA for CI/CD adminsAuthentication logs
Control automation identitiesSeparate pipeline identitiesIdentity inventory

Article 21(2)(b) — Segregation of Duties

DORA RequirementCI/CD ControlEvidence Generated
Separate conflicting rolesCode review requirementsPull request history
Prevent self-approvalApproval rules enforced by pipelineApproval records
Control release authoritySeparate build and deploy permissionsPipeline role mapping
Log overrides and exceptionsException loggingOverride audit logs

Article 21(2)(c) — Logging and Monitoring

DORA RequirementCI/CD ControlEvidence Generated
Monitor ICT system activityFull pipeline execution loggingExecution logs
Detect security-relevant eventsFailed controls and anomaly alertsSecurity alerts
Retain logs securelyCentralized log storageRetention configuration
Support investigationsImmutable audit trailsForensic-ready logs

Article 21(2)(d) — Change Management & Integrity

DORA RequirementCI/CD ControlEvidence Generated
Control changes to ICT systemsMandatory CI/CD pipelinesDeployment history
Ensure integrity of changesArtifact signing and verificationSignature metadata
Trace changes end-to-endSource → pipeline → artifact linkageProvenance records
Prevent unauthorized deploymentsPolicy gates and approvalsGate enforcement logs

Article 21(2)(e) — Resilience, Backup, and Recovery

DORA RequirementCI/CD ControlEvidence Generated
Ensure system resilienceHardened, isolated build environmentsEnvironment configuration
Prevent single points of failureRedundant CI/CD componentsArchitecture documentation
Enable recovery mechanismsRollback and redeploy workflowsRecovery logs
Protect configurationsSecure backup of pipeline configBackup records

Article 21(2)(f) — Continuous Improvement

DORA RequirementCI/CD ControlEvidence Generated
Review ICT risk posturePeriodic pipeline security reviewsReview reports
Update controls as neededPipeline configuration changesChange logs
Improve detection and preventionTool updates and rule tuningVersion history
Align with evolving threatsThreat-informed pipeline updatesRisk assessments

How Auditors Use This Table

  • Validate that Article 21 requirements are technically enforced
  • Identify where CI/CD contributes to ICT risk management
  • Request specific evidence generated by pipelines
  • Assess consistency and repeatability of controls

Related Resources


Audit-ready context

Written for regulated environments: controls before tools, policy enforcement in CI/CD, and evidence-by-design for audits.

Focus areas include traceability, approvals, exception governance, and evidence retention across build, release, and operations.

See methodology on the About page.