DORA Article 28 Checklist — Auditor View vs Engineer View

This checklist contrasts what auditors verify with what engineers must actually implement to achieve effective and defensible DORA Article 28 compliance.


1. Supplier Inventory & Criticality

Auditor checksEngineer implements
Complete inventory of ICT third-party providersCMDB or supplier registry including CI/CD, Git, cloud, registries
Supplier classification by criticalityCriticality tags linked to delivery systems
Alignment with business servicesMapping pipelines → services → suppliers
Inventory kept up to dateAutomated or process-driven updates tied to tooling usage

Common gap: CI/CD SaaS tools not listed as suppliers.


2. Contractual Clauses & Rights

Auditor checksEngineer implements
Audit rights defined in contractsPlatforms capable of read-only audit access
Incident notification obligationsMonitoring and alerting pipelines connected to incident workflows
Evidence retention commitmentsLog and artifact retention configured to meet contract duration
Subprocessor visibilityDocumented SaaS dependency chains

Common gap: Contracts exist but tooling cannot technically support audits.


3. Access Control & Segregation of Duties

Auditor checksEngineer implements
Role separation enforcedIAM roles for dev, approver, operator
No single-user end-to-end controlBranch protection + approval workflows
Access reviews performedPeriodic access reviews supported by logs
Least privilege appliedToken scopes, runner permissions, environment separation

Common gap: Admin access shared across CI/CD roles.


4. CI/CD Enforcement Controls

Auditor checksEngineer implements
Controls enforced automaticallyPolicy-as-code in pipelines
No bypass of approvalsMandatory gates for release and deploy
Artifact integrity ensuredSBOM generation, signing, verification
Third-party tools governedApproved runner images, restricted plugins

Common gap: Controls enforced “by convention”, not technically.


5. Monitoring & Incident Evidence

Auditor checksEngineer implements
Continuous monitoring of suppliersCI/CD, registry, cloud logs collected
Incident detection capabilityAlerts tied to third-party services
Incident traceabilityTickets linked to logs, pipelines, artifacts
Evidence of past incidentsRetained logs, timelines, RCA documentation

Common gap: Logs exist but are not centralized or retained.


6. Subprocessor Governance

Auditor checksEngineer implements
Visibility into subprocessorsDocumentation of SaaS dependencies
Awareness of data flowsArchitecture diagrams showing third-party paths
Risk awarenessRisk assessment referencing real dependencies

Common gap: “Hidden” subprocessors inside CI/CD platforms.


7. Exit Strategy & Resilience

Auditor checksEngineer implements
Documented exit strategyAlternative tooling identified
Exit feasibilityArtifact portability, IaC reproducibility
Exit testing evidenceDR / exit tests executed and logged
No single-vendor dependencyReduced coupling to SaaS-specific features

Common gap: Exit plan exists only as a document.


8. Evidence Quality & Availability

Auditor checksEngineer implements
Evidence is objectiveLogs, approvals, SBOMs generated automatically
Evidence is time-boundTimestamped and immutable records
Evidence is accessibleCentralized storage, controlled access
Evidence is consistentSame controls across environments

Common gap: Evidence collected manually “just before audit”.


Final Auditor Reality Check

Auditors do not validate:

  • intentions,
  • explanations,
  • architecture slides alone.

They validate:

  • controls in operation,
  • evidence produced by systems,
  • consistency over time.

Final Engineer Reality Check

Engineers succeed when:

  • compliance is designed into CI/CD,
  • controls generate evidence continuously,
  • audits become verification, not reconstruction.

Recommended Companion Content


Audit-ready context

Written for regulated environments: controls before tools, policy enforcement in CI/CD, and evidence-by-design for audits.

Focus areas include traceability, approvals, exception governance, and evidence retention across build, release, and operations.

See methodology on the About page.