DORA Article 28 Architecture: Third-Party Risk Controls Across CI/CD Pipelines

Introduction

DORA Article 28 requires financial entities to manage risks arising from ICT third-party service providers.

In modern software delivery, these providers are not peripheral — they are embedded directly into CI/CD pipelines and cloud runtime environments.

This article presents a practical architecture view of DORA Article 28, showing:

  • where third-party providers intervene across the CI/CD lifecycle,
  • which controls must be applied to remain compliant,
  • and how evidence must be produced to satisfy auditors.

The objective is not to describe tools, but to clarify control boundaries, enforcement points, and audit expectations.


The Real CI/CD Supply Chain Under DORA

A typical enterprise CI/CD pipeline relies on multiple external ICT providers, often without being explicitly treated as such.

Under DORA Article 28, the following components must be considered ICT third-party services:

  • Source code hosting platforms
  • CI/CD orchestration services
  • Artifact registries and dependency ecosystems
  • Cloud runtime and managed infrastructure services

Each of these components can impact software integrity, availability, confidentiality, and operational resilience.


Where Third-Party Providers Intervene

Git Hosting Platforms

Source code hosting platforms are a critical control point in the delivery lifecycle.

They provide:

  • access to source code,
  • change management workflows,
  • identity and permission enforcement.

From a DORA perspective, Git platforms:

  • influence code integrity,
  • enforce (or bypass) segregation of duties,
  • generate key audit evidence (approvals, commits, access logs).

They must therefore be governed as ICT third-party providers, not just developer tools.


CI/CD SaaS Platforms

CI/CD orchestration platforms automate build, test, and deployment workflows.

They often execute code with elevated privileges and access to sensitive assets.

Under Article 28, CI/CD SaaS platforms:

  • represent a high-impact third-party dependency,
  • must be subject to strict access control,
  • must enforce policy consistently across pipelines.

Failure or compromise of these platforms can directly lead to software supply chain incidents.


Artifact Registries and Dependency Ecosystems

Artifact repositories and dependency registries introduce external code and artifacts into production systems.

They are responsible for:

  • storing build outputs,
  • distributing dependencies,
  • enforcing integrity and immutability.

From a DORA standpoint, they:

  • act as supply chain intermediaries,
  • require controls to prevent tampering,
  • must support traceability and provenance.

Cloud Runtime and Managed Infrastructure

Cloud providers host:

  • runtime environments,
  • deployment platforms,
  • monitoring and logging systems.

They are critical ICT third-party providers whose availability and security directly affect business services.

Under Article 28, cloud runtime services must be:

  • included in supplier inventories,
  • governed by contractual safeguards,
  • continuously monitored for operational risk.

Controls Required Under DORA Article 28

DORA Article 28 does not prescribe specific technologies.

It requires enforceable controls that reduce third-party risk and generate evidence.

Three control categories are fundamental in CI/CD architectures.


Access Isolation

Access isolation ensures that third-party platforms cannot be misused or over-privileged.

Key principles include:

  • role-based access control,
  • segregation of duties across development, approval, and deployment,
  • least-privilege access for pipelines and automation.

In CI/CD architectures, access isolation applies to:

  • Git repositories,
  • CI/CD pipelines and runners,
  • artifact repositories,
  • cloud runtime environments.

Evidence must demonstrate that no single actor or system can bypass controls end-to-end.


Contractual Policy Enforcement

Contracts alone are not sufficient under DORA Article 28.

Policies defined contractually must be enforced technically.

This includes:

  • mandatory approvals,
  • security gates,
  • restricted execution paths,
  • audit and inspection capabilities.

CI/CD pipelines are the natural enforcement layer for these policies:

  • approvals are enforced before release,
  • policy-as-code prevents unauthorized changes,
  • third-party platforms operate under defined constraints.

Auditors expect consistency between what contracts require and what systems enforce.


Evidence Collection and Retention

DORA Article 28 is fundamentally evidence-driven.

Controls must produce:

  • access logs,
  • approval records,
  • build and artifact metadata,
  • monitoring and incident records.

Evidence must be:

  • automatically generated,
  • time-stamped,
  • protected against tampering,
  • retained according to regulatory requirements.

Manual evidence collection shortly before audits is a common red flag.


Architecture Principles for Article 28 Compliance

An effective DORA Article 28 architecture follows these principles:

  • Third-party platforms are treated as in-scope ICT providers
  • Controls are enforced inside CI/CD pipelines, not externally
  • Evidence is generated as a by-product of normal operations
  • Exit strategies are supported by architectural choices, not documents alone

This approach aligns governance, engineering, and audit needs.


Relationship with DORA Article 21

Article 21 focuses on internal ICT risk management.

Article 28 extends the same logic to external ICT dependencies.

In practice:

  • Article 21 defines what controls must exist,
  • Article 28 defines where else they must apply.

A single CI/CD architecture must therefore satisfy both internal and third-party risk requirements.


Key Takeaway

DORA Article 28 compliance is not achieved through vendor questionnaires or contractual statements alone.

It requires:

  • explicit identification of third-party dependencies,
  • enforceable controls embedded in CI/CD pipelines,
  • continuous evidence generation.

A well-designed CI/CD architecture transforms third-party risk management from a periodic exercise into continuous, auditable control.


Related Content


Audit-ready context

Written for regulated environments: controls before tools, policy enforcement in CI/CD, and evidence-by-design for audits.

Focus areas include traceability, approvals, exception governance, and evidence retention across build, release, and operations.

See methodology on the About page.