DORA Article 28 — Auditor Checklist (Yes / No / Evidence)

This checklist is designed for formal audit reviews of ICT third-party risk management under DORA Article 28.

Each control must be objectively verifiable through evidence.


1. ICT Third-Party Inventory

ControlYesNoEvidence
A complete inventory of ICT third-party providers existsSupplier register
CI/CD platforms are included as ICT providersSupplier inventory extract
Cloud service providers are includedSupplier inventory
Artifact registries and package ecosystems are listedSupplier mapping
Inventory is reviewed and updated periodicallyReview records

2. Criticality Classification

ControlYesNoEvidence
ICT providers are classified by criticalityClassification methodology
Classification criteria are documentedRisk framework
Critical providers are explicitly identifiedSupplier list
CI/CD tooling supporting critical functions is classified accordinglyMapping document
Classification impacts governance requirementsControl mapping

3. Pre-Contract Due Diligence

ControlYesNoEvidence
Security due diligence is performed before onboardingDue diligence reports
Risk assessment covers ICT and operational risksRisk assessment
Subprocessor usage is assessedSupplier disclosures
Due diligence results are documentedReview records
Approval is required before onboardingApproval workflow

4. Contractual Safeguards

ControlYesNoEvidence
Contracts include information security requirementsContract clauses
Audit and inspection rights are definedContract extracts
Incident notification obligations are definedSLA clauses
Evidence retention requirements are includedContract terms
Exit and termination clauses are definedContract clauses

5. Access Control & Segregation of Duties

ControlYesNoEvidence
Access to third-party platforms is role-basedIAM configuration
Segregation of duties is enforcedAccess matrix
Privileged access is restricted and monitoredAccess logs
Access reviews are performed periodicallyReview records
Access revocation is documentedOffboarding records

6. CI/CD Enforcement Controls

ControlYesNoEvidence
CI/CD pipelines enforce approval gatesPipeline configuration
Security controls cannot be bypassedPolicy definitions
Third-party CI/CD runners are governedRunner configuration
Artifact integrity is protectedSBOM / signing reports
Pipeline changes are loggedAudit logs

7. Monitoring & Incident Management

ControlYesNoEvidence
Third-party services are continuously monitoredMonitoring dashboards
Security incidents are detectedAlert logs
Incidents involving ICT providers are trackedIncident tickets
Incident notification timelines are respectedIncident records
Incident post-mortems are documentedRCA reports

8. Subprocessor Governance

ControlYesNoEvidence
Visibility into subcontractors existsSupplier disclosures
Subprocessors are approvedApproval records
Subprocessor risks are assessedRisk assessments
Changes in subprocessors are monitoredChange notifications

9. Exit Strategy & Resilience

ControlYesNoEvidence
Exit strategies exist for critical providersExit plans
Exit strategies are documentedDocumentation
Exit feasibility has been assessedAssessment reports
Exit or fallback tests have been performedTest reports
Exit strategies are reviewed periodicallyReview records

10. Evidence Management

ControlYesNoEvidence
Evidence is centrally storedEvidence repository
Evidence is time-stamped and immutableLog configuration
Evidence retention meets regulatory needsRetention policies
Evidence access is controlledAccess logs
Evidence can be produced on requestAudit extracts

Auditor Conclusion

AssessmentResult
Overall Article 28 compliance☐ Compliant ☐ Partially Compliant ☐ Non-Compliant
Major findings identified☐ Yes ☐ No
Remediation plan required☐ Yes ☐ No

Key Audit Principle

Under DORA Article 28, absence of evidence is evidence of absence.

Controls must be operational, repeatable, and provable.


Recommanded Internal Links


Audit-ready context

Written for regulated environments: controls before tools, policy enforcement in CI/CD, and evidence-by-design for audits.

Focus areas include traceability, approvals, exception governance, and evidence retention across build, release, and operations.

See methodology on the About page.