What to Show, Where to Find It, and Why It Matters
This evidence pack lists the technical and operational artifacts that financial institutions should present to demonstrate compliance with DORA Article 21. It focuses on CI/CD pipelines as regulated ICT systems and emphasizes reproducible, audit-ready evidence.
How to Use This Evidence Pack
Use as a checklist during audit preparation
Share with engineering, security, and compliance teams
Attach references to real systems, logs, and repositories
Ensure evidence is current, traceable, and reproducible
Article 21(1) — ICT Risk Management Framework
Evidence to Provide
Evidence Type What Auditors Expect ICT risk register CI/CD pipelines explicitly listed as in-scope ICT systems Threat models CI/CD-related risks (credential abuse, supply chain, integrity) Risk treatment plans Controls mapped to CI/CD pipelines Governance documentation Ownership of CI/CD security and risk
Typical Sources
Risk management tooling
Architecture documentation
Security governance repositories
Article 21(2)(a) — Access Control
Evidence to Provide
Evidence Type What Auditors Expect IAM policies Least privilege for CI/CD service accounts RBAC configuration Role separation for pipeline administration MFA enforcement Proof MFA is required for privileged users Identity inventory Distinction between human and automation identities
Typical Sources
IAM platform
CI/CD system configuration
Access review reports
Article 21(2)(b) — Segregation of Duties
Evidence to Provide
Evidence Type What Auditors Expect Code review rules Mandatory peer review enforced Approval workflows Independent approval for production changes Role mapping Separation between build, validation, deploy roles Exception logs Records of overrides and approvals
Typical Sources
Source control platform
CI/CD pipeline definitions
Audit logs
Article 21(2)(c) — Logging and Monitoring
Evidence to Provide
Evidence Type What Auditors Expect Pipeline execution logs Complete history of runs and outcomes Security event logs Failed checks, blocked releases Monitoring dashboards Visibility into pipeline health Log retention policies Alignment with regulatory requirements
Typical Sources
CI/CD platforms
SIEM / logging systems
Monitoring tools
Article 21(2)(d) — Change Management & Integrity
Evidence to Provide
Evidence Type What Auditors Expect Deployment records All production changes traceable to pipelines Artifact signing Proof of cryptographic integrity Provenance metadata Source → build → artifact linkage Release approvals Auditable decision points
Typical Sources
Artifact repositories
CI/CD metadata stores
Release management systems
Article 21(2)(e) — Resilience, Backup, and Recovery
Evidence to Provide
Evidence Type What Auditors Expect CI/CD architecture diagrams Redundancy and isolation Backup procedures Secure backups of pipeline configs Recovery tests Evidence of rollback and recovery exercises Incident playbooks CI/CD-specific response procedures
Typical Sources
Architecture documentation
Backup systems
Incident management tooling
Article 21(2)(f) — Continuous Improvement
Evidence to Provide
Evidence Type What Auditors Expect Review reports Periodic CI/CD security reviews Change logs Improvements to pipeline controls Metrics & KPIs Security and resilience indicators Management oversight Evidence of governance review
Typical Sources
Security review records
CI/CD change history
Governance meeting notes
Common Audit Pitfalls (What NOT to Show Alone)
Auditors will challenge:
High-level policies without technical enforcement
Screenshots without traceability
Manual attestations without system evidence
One-off examples instead of repeatable controls
Evidence must be system-generated, timestamped, and reproducible .
Auditor-Friendly Packaging Tips
Group evidence by Article 21 subsection
Provide read-only access to logs and dashboards
Include sample evidence + explanation
Clearly indicate control owners
Avoid overloading auditors with irrelevant data
🔗 Related Resources
Audit-ready context
Written for regulated environments: controls before tools, policy enforcement in CI/CD, and evidence-by-design for audits.
Focus areas include traceability, approvals, exception governance, and evidence retention across build, release, and operations.
See methodology on the About page.