DORA Article 28 — Auditor Checklist (Engineer & Auditor Perspectives)

Introduction

This checklist is designed for formal audit reviews of ICT third-party risk management under DORA Article 28. It serves two audiences simultaneously:

  • Auditors use it to verify controls, assess evidence, and identify gaps.
  • Engineers use it to understand what must be implemented and where common gaps occur.

Each section covers a specific Article 28 domain with: the formal audit checklist (Yes / No / Evidence), the corresponding engineer implementation expectations, and the common gaps that typically surface during audits.

1. ICT Third-Party Inventory

Audit Checklist

ControlYesNoEvidence
A complete inventory of ICT third-party providers existsSupplier register
CI/CD platforms are included as ICT providersSupplier inventory extract
Cloud service providers are includedSupplier inventory
Artifact registries and package ecosystems are listedSupplier mapping
Inventory is reviewed and updated periodicallyReview records

Engineer Implementation

Auditor checksEngineer implements
Complete inventory of ICT third-party providersCMDB or supplier registry including CI/CD, Git, cloud, registries
Supplier classification by criticalityCriticality tags linked to delivery systems
Alignment with business servicesMapping pipelines → services → suppliers
Inventory kept up to dateAutomated or process-driven updates tied to tooling usage

Common gap: CI/CD SaaS tools not listed as suppliers.

2. Criticality Classification

Audit Checklist

ControlYesNoEvidence
ICT providers are classified by criticalityClassification methodology
Classification criteria are documentedRisk framework
Critical providers are explicitly identifiedSupplier list
CI/CD tooling supporting critical functions is classified accordinglyMapping document
Classification impacts governance requirementsControl mapping

3. Pre-Contract Due Diligence

Audit Checklist

ControlYesNoEvidence
Security due diligence is performed before onboardingDue diligence reports
Risk assessment covers ICT and operational risksRisk assessment
Subprocessor usage is assessedSupplier disclosures
Due diligence results are documentedReview records
Approval is required before onboardingApproval workflow

4. Contractual Safeguards

Audit Checklist

ControlYesNoEvidence
Contracts include information security requirementsContract clauses
Audit and inspection rights are definedContract extracts
Incident notification obligations are definedSLA clauses
Evidence retention requirements are includedContract terms
Exit and termination clauses are definedContract clauses

Engineer Implementation

Auditor checksEngineer implements
Audit rights defined in contractsPlatforms capable of read-only audit access
Incident notification obligationsMonitoring and alerting pipelines connected to incident workflows
Evidence retention commitmentsLog and artifact retention configured to meet contract duration
Subprocessor visibilityDocumented SaaS dependency chains

Common gap: Contracts exist but tooling cannot technically support audits.

5. Access Control & Segregation of Duties

Audit Checklist

ControlYesNoEvidence
Access to third-party platforms is role-basedIAM configuration
Segregation of duties is enforcedAccess matrix
Privileged access is restricted and monitoredAccess logs
Access reviews are performed periodicallyReview records
Access revocation is documentedOffboarding records

Engineer Implementation

Auditor checksEngineer implements
Role separation enforcedIAM roles for dev, approver, operator
No single-user end-to-end controlBranch protection + approval workflows
Access reviews performedPeriodic access reviews supported by logs
Least privilege appliedToken scopes, runner permissions, environment separation

Common gap: Admin access shared across CI/CD roles.

6. CI/CD Enforcement Controls

Audit Checklist

ControlYesNoEvidence
CI/CD pipelines enforce approval gatesPipeline configuration
Security controls cannot be bypassedPolicy definitions
Third-party CI/CD runners are governedRunner configuration
Artifact integrity is protectedSBOM / signing reports
Pipeline changes are loggedAudit logs

Engineer Implementation

Auditor checksEngineer implements
Controls enforced automaticallyPolicy-as-code in pipelines
No bypass of approvalsMandatory gates for release and deploy
Artifact integrity ensuredSBOM generation, signing, verification
Third-party tools governedApproved runner images, restricted plugins

Common gap: Controls enforced “by convention”, not technically.

7. Monitoring & Incident Management

Audit Checklist

ControlYesNoEvidence
Third-party services are continuously monitoredMonitoring dashboards
Security incidents are detectedAlert logs
Incidents involving ICT providers are trackedIncident tickets
Incident notification timelines are respectedIncident records
Incident post-mortems are documentedRCA reports

Engineer Implementation

Auditor checksEngineer implements
Continuous monitoring of suppliersCI/CD, registry, cloud logs collected
Incident detection capabilityAlerts tied to third-party services
Incident traceabilityTickets linked to logs, pipelines, artifacts
Evidence of past incidentsRetained logs, timelines, RCA documentation

Common gap: Logs exist but are not centralized or retained.

8. Subprocessor Governance

Audit Checklist

ControlYesNoEvidence
Visibility into subcontractors existsSupplier disclosures
Subprocessors are approvedApproval records
Subprocessor risks are assessedRisk assessments
Changes in subprocessors are monitoredChange notifications

Engineer Implementation

Auditor checksEngineer implements
Visibility into subprocessorsDocumentation of SaaS dependencies
Awareness of data flowsArchitecture diagrams showing third-party paths
Risk awarenessRisk assessment referencing real dependencies

Common gap: “Hidden” subprocessors inside CI/CD platforms.

9. Exit Strategy & Resilience

Audit Checklist

ControlYesNoEvidence
Exit strategies exist for critical providersExit plans
Exit strategies are documentedDocumentation
Exit feasibility has been assessedAssessment reports
Exit or fallback tests have been performedTest reports
Exit strategies are reviewed periodicallyReview records

Engineer Implementation

Auditor checksEngineer implements
Documented exit strategyAlternative tooling identified
Exit feasibilityArtifact portability, IaC reproducibility
Exit testing evidenceDR / exit tests executed and logged
No single-vendor dependencyReduced coupling to SaaS-specific features

Common gap: Exit plan exists only as a document.

10. Evidence Management & Retention

Audit Checklist

ControlYesNoEvidence
Evidence is centrally storedEvidence repository
Evidence is time-stamped and immutableLog configuration
Evidence retention meets regulatory needsRetention policies
Evidence access is controlledAccess logs
Evidence can be produced on requestAudit extracts

Engineer Implementation

Auditor checksEngineer implements
Evidence is objectiveLogs, approvals, SBOMs generated automatically
Evidence is time-boundTimestamped and immutable records
Evidence is accessibleCentralized storage, controlled access
Evidence is consistentSame controls across environments

Common gap: Evidence collected manually “just before audit”.


Auditor Conclusion

AssessmentResult
Overall Article 28 compliance☐ Compliant ☐ Partially Compliant ☐ Non-Compliant
Major findings identified☐ Yes ☐ No
Remediation plan required☐ Yes ☐ No

Key Principles

Auditor Reality Check

Auditors do not validate intentions, explanations, or architecture slides alone. They validate: controls in operation, evidence produced by systems, and consistency over time.

Under DORA Article 28, absence of evidence is evidence of absence. Controls must be operational, repeatable, and provable.

Engineer Reality Check

Engineers succeed when: compliance is designed into CI/CD, controls generate evidence continuously, and audits become verification — not reconstruction.

Recommended Related Content


Audit-ready context

Written for regulated environments: controls before tools, policy enforcement in CI/CD, and evidence-by-design for audits.

Focus areas include traceability, approvals, exception governance, and evidence retention across build, release, and operations.

See methodology on the About page.