DORA Article 28 — Mapping Controls to Evidence

This mapping links DORA Article 28 obligations to concrete technical and organizational controls, and the evidence auditors expect to verify.

It is designed to eliminate ambiguity between regulatory text, implementation, and audit verification.


1. ICT Third-Party Identification

Article 28 Requirement

Financial entities shall identify and maintain an inventory of all ICT third-party service providers.

Controls implementedEvidence produced
Centralized ICT supplier inventorySupplier register export
Mandatory registration of CI/CD, cloud, SaaS toolsInventory records including CI/CD tooling
Ownership and business mappingSupplier → business service mapping
Periodic inventory reviewReview meeting minutes / logs

2. Criticality Classification

Article 28 Requirement

ICT third-party providers shall be classified based on criticality and risk.

Controls implementedEvidence produced
Risk-based supplier classification frameworkClassification methodology
Identification of critical ICT providersCritical supplier list
CI/CD tools classified when supporting critical servicesCI/CD → service mapping
Governance escalation for critical providersRisk committee records

3. Pre-Contract Due Diligence

Article 28 Requirement

Risk assessments shall be performed before entering into contractual arrangements.

Controls implementedEvidence produced
Security due diligence processDue diligence reports
Risk assessment covering ICT and operational riskRisk assessment documents
Subprocessor disclosure reviewSupplier disclosures
Formal approval before onboardingApproval records

4. Contractual Safeguards

Article 28 Requirement

Contracts shall include minimum security, audit, and exit provisions.

Controls implementedEvidence produced
Standard contract clauses for ICT suppliersContract clause extracts
Audit and inspection rightsSigned contracts
Incident notification SLAsSLA documentation
Evidence retention obligationsContract terms
Exit and termination clausesExit provisions

5. Access Control & Segregation of Duties

Article 28 Requirement

Access to ICT services shall be appropriately controlled.

Controls implementedEvidence produced
Role-based access control (RBAC)IAM configuration exports
Segregation of duties in CI/CDAccess matrix
Privileged access monitoringAccess logs
Periodic access reviewsReview reports

6. CI/CD Enforcement Controls

Article 28 Requirement

Controls shall prevent unauthorized changes and ensure integrity.

Controls implementedEvidence produced
Mandatory approvals and policy gatesPipeline configurations
Policy-as-code enforcementPolicy definitions
Controlled CI/CD runnersRunner configuration
Artifact integrity protectionSBOM, signing reports
Change traceabilityCI/CD audit logs

7. Monitoring & Incident Management

Article 28 Requirement

ICT third-party risks shall be continuously monitored.

Controls implementedEvidence produced
Continuous monitoring of ICT servicesMonitoring dashboards
Alerting on third-party failuresAlert logs
Incident trackingIncident tickets
Incident escalation proceduresIncident workflows
Post-incident reviewsRCA reports

8. Subprocessor Governance

Article 28 Requirement

Risks arising from subcontracting chains shall be managed.

Controls implementedEvidence produced
Visibility into subprocessorsSupplier disclosures
Subprocessor approval processApproval records
Risk assessments for subprocessorsRisk reports
Monitoring of subprocessor changesChange notifications

9. Exit Strategy & Resilience

Article 28 Requirement

Exit strategies shall ensure continuity in case of supplier failure.

Controls implementedEvidence produced
Documented exit strategiesExit plans
Feasibility assessmentsFeasibility reports
Exit or fallback testingTest reports
Periodic review of exit plansReview records

10. Evidence Management & Retention

Article 28 Requirement

Evidence shall be available, protected, and retained.

Controls implementedEvidence produced
Centralized evidence repositoryEvidence storage
Time-stamped, immutable logsLog configuration
Retention policies enforcedRetention policy documents
Controlled access to evidenceAccess logs
On-demand evidence productionAudit extracts

How Auditors Use This Mapping

Auditors typically:

  • start from Article 28 requirements,
  • verify that controls exist and operate,
  • request direct evidence for each control.

If a control cannot produce evidence, it is considered ineffective.


Key Takeaway

DORA Article 28 compliance is achieved when every regulatory requirement is traceable to controls, and every control produces evidence.

This mapping provides the backbone for:

  • audit preparation,
  • continuous compliance,
  • CI/CD governance in regulated environments.

Recommended Related Content


Audit-ready context

Written for regulated environments: controls before tools, policy enforcement in CI/CD, and evidence-by-design for audits.

Focus areas include traceability, approvals, exception governance, and evidence retention across build, release, and operations.

See methodology on the About page.