DORA Article 21 — Evidence Pack for Auditors

What to Show, Where to Find It, and Why It Matters

This evidence pack lists the technical and operational artifacts that financial institutions should present to demonstrate compliance with DORA Article 21.
It focuses on CI/CD pipelines as regulated ICT systems and emphasizes reproducible, audit-ready evidence.


How to Use This Evidence Pack

  • Use as a checklist during audit preparation
  • Share with engineering, security, and compliance teams
  • Attach references to real systems, logs, and repositories
  • Ensure evidence is current, traceable, and reproducible

Article 21(1) — ICT Risk Management Framework

Evidence to Provide

Evidence TypeWhat Auditors Expect
ICT risk registerCI/CD pipelines explicitly listed as in-scope ICT systems
Threat modelsCI/CD-related risks (credential abuse, supply chain, integrity)
Risk treatment plansControls mapped to CI/CD pipelines
Governance documentationOwnership of CI/CD security and risk

Typical Sources

  • Risk management tooling
  • Architecture documentation
  • Security governance repositories

Article 21(2)(a) — Access Control

Evidence to Provide

Evidence TypeWhat Auditors Expect
IAM policiesLeast privilege for CI/CD service accounts
RBAC configurationRole separation for pipeline administration
MFA enforcementProof MFA is required for privileged users
Identity inventoryDistinction between human and automation identities

Typical Sources

  • IAM platform
  • CI/CD system configuration
  • Access review reports

Article 21(2)(b) — Segregation of Duties

Evidence to Provide

Evidence TypeWhat Auditors Expect
Code review rulesMandatory peer review enforced
Approval workflowsIndependent approval for production changes
Role mappingSeparation between build, validation, deploy roles
Exception logsRecords of overrides and approvals

Typical Sources

  • Source control platform
  • CI/CD pipeline definitions
  • Audit logs

Article 21(2)(c) — Logging and Monitoring

Evidence to Provide

Evidence TypeWhat Auditors Expect
Pipeline execution logsComplete history of runs and outcomes
Security event logsFailed checks, blocked releases
Monitoring dashboardsVisibility into pipeline health
Log retention policiesAlignment with regulatory requirements

Typical Sources

  • CI/CD platforms
  • SIEM / logging systems
  • Monitoring tools

Article 21(2)(d) — Change Management & Integrity

Evidence to Provide

Evidence TypeWhat Auditors Expect
Deployment recordsAll production changes traceable to pipelines
Artifact signingProof of cryptographic integrity
Provenance metadataSource → build → artifact linkage
Release approvalsAuditable decision points

Typical Sources

  • Artifact repositories
  • CI/CD metadata stores
  • Release management systems

Article 21(2)(e) — Resilience, Backup, and Recovery

Evidence to Provide

Evidence TypeWhat Auditors Expect
CI/CD architecture diagramsRedundancy and isolation
Backup proceduresSecure backups of pipeline configs
Recovery testsEvidence of rollback and recovery exercises
Incident playbooksCI/CD-specific response procedures

Typical Sources

  • Architecture documentation
  • Backup systems
  • Incident management tooling

Article 21(2)(f) — Continuous Improvement

Evidence to Provide

Evidence TypeWhat Auditors Expect
Review reportsPeriodic CI/CD security reviews
Change logsImprovements to pipeline controls
Metrics & KPIsSecurity and resilience indicators
Management oversightEvidence of governance review

Typical Sources

  • Security review records
  • CI/CD change history
  • Governance meeting notes

Common Audit Pitfalls (What NOT to Show Alone)

Auditors will challenge:

  • High-level policies without technical enforcement
  • Screenshots without traceability
  • Manual attestations without system evidence
  • One-off examples instead of repeatable controls

Evidence must be system-generated, timestamped, and reproducible.


Auditor-Friendly Packaging Tips

  • Group evidence by Article 21 subsection
  • Provide read-only access to logs and dashboards
  • Include sample evidence + explanation
  • Clearly indicate control owners
  • Avoid overloading auditors with irrelevant data

🔗 Related Resources


Audit-ready context

Written for regulated environments: controls before tools, policy enforcement in CI/CD, and evidence-by-design for audits.

Focus areas include traceability, approvals, exception governance, and evidence retention across build, release, and operations.

See methodology on the About page.