Supplier Governance & CI/CD Controls Checklist

Third-Party ICT Risk Controls for Regulated CI/CD Pipelines

Why this checklist exists

In regulated environments, suppliers are not “external.” They are part of your delivery system.

When third-party services support your SDLC (Git hosting, CI/CD SaaS, artifact registries, cloud runtime, security scanners), auditors expect you to demonstrate:

  • Supplier governance (inventory, classification, contracts, exit plans)
  • CI/CD technical controls (access isolation, policy enforcement, evidence retention)
  • Continuous monitoring and accountability (sub-processors, SLAs, incidents)

This checklist is designed to be used by security, engineering, risk, and audit teams as a shared control baseline.

Scope: suppliers that typically affect CI/CD

Use this checklist for any supplier providing:

  • Git hosting (GitHub/GitLab SaaS)
  • CI/CD platform (GitHub Actions, GitLab CI SaaS, CircleCI, etc.)
  • Runners (hosted runners / shared runners / cloud runners)
  • Artifact registries (container / Maven / binary registries)
  • Dependency proxies and mirrors
  • Cloud runtime / managed Kubernetes / PaaS
  • Security tooling SaaS (SAST/DAST/SCA, secret scanning)
  • Observability and logging SaaS (SIEM / monitoring)

1) Supplier inventory & ownership

Checklist

  • A complete inventory of suppliers used across SDLC/CI/CD exists (including shadow usage).
  • Each supplier has a named business owner and technical owner.
  • The inventory captures where the supplier sits (Git, CI, registry, runtime, logging).
  • Criticality is defined per supplier (impact if unavailable/compromised).
  • Supplier data locations and hosting model are documented (EU/US, multi-region, etc.).
  • Third-party access paths to your systems are listed (SSO, API tokens, agents, webhooks).

Evidence examples

  • Supplier inventory spreadsheet / CMDB entry
  • Architecture map showing supplier touchpoints
  • Ownership register (RACI)

2) Supplier risk classification

Checklist

  • A formal risk classification exists (Critical / High / Medium / Low).
  • Risk rating includes confidentiality, integrity, availability, and regulatory impact.
  • CI/CD and artifact suppliers are treated as integrity-critical by default.
  • Risk rating drives mandatory control requirements (e.g., stronger logging, exit plan).
  • Risk rating is reviewed at least annually or upon major change.

Evidence examples

  • Risk assessment report / questionnaire
  • Third-party risk methodology
  • Review timestamps and approvals

3) Contractual baseline (security + auditability)

Checklist

  • Contract includes security obligations (baseline controls, vulnerability handling, encryption).
  • Contract includes audit rights or equivalent assurance mechanism.
  • Contract includes breach/incident notification timelines (including materiality criteria).
  • Contract includes sub-processor disclosure obligations.
  • Contract includes data retention and deletion requirements.
  • Contract includes service continuity expectations (BCP/DR).
  • Contract includes exit/transition terms (data export, migration support).

Evidence examples

  • Signed contract clauses (security annex)
  • Sub-processor register
  • Incident notification SLA clause

4) Identity, access, and isolation (technical enforcement)

Checklist

  • SSO is enforced for supplier admin consoles where possible.
  • MFA is mandatory for privileged accounts.
  • Roles are minimal and mapped to job needs (least privilege).
  • Access reviews are performed regularly (quarterly for critical suppliers).
  • CI/CD runners are isolated (no shared runners for sensitive workloads).
  • Secrets are not stored in supplier UIs unless controlled (use vault/injection).
  • Third-party tokens are scoped, rotated, and monitored.

Evidence examples

  • IAM policy exports / screenshots
  • Access review logs
  • Runner configuration showing isolation
  • Token rotation policy + proof

5) Pipeline policy enforcement (gates that cannot be bypassed)

Checklist

  • Mandatory approvals exist for production deployments.
  • Policy gates block releases on critical scan failures (SAST/SCA/DAST as applicable).
  • Artifact signing is enforced before release promotion.
  • SBOM generation is automated for releases.
  • Protected branches / merge rules are enforced for regulated repos.
  • Exceptions are governed (time-bound, approved, documented).
  • Pipeline administrators cannot silently disable controls (tracked changes).

Evidence examples

  • CI/CD pipeline config (gates)
  • Protected branch configuration
  • Release approval records
  • Exception register

6) Evidence generation and retention (audit-ready by design)

Checklist

  • CI/CD logs are retained for a defined period aligned with requirements.
  • Approval events are logged and exportable.
  • Security scan results are stored centrally (not only in vendor dashboards).
  • Traceability exists: commit → pipeline run → artifact → deployment → production.
  • Evidence store is tamper-resistant or access-controlled.
  • Audit exports are tested (ability to produce evidence quickly).

Evidence examples

  • Evidence retention policy
  • SIEM retention settings / archive configuration
  • Traceability report (sample release)
  • Export test record (“audit drill”)

7) Monitoring, incidents, and supplier accountability

Checklist

  • Supplier provides security incident notifications within defined SLA.
  • You monitor supplier status/availability and integrate signals into ops workflows.
  • CI/CD pipeline anomalies are monitored (unexpected workflows, new tokens, new runners).
  • Supplier security advisories are tracked and assessed.
  • You maintain an internal incident playbook referencing supplier escalation paths.
  • You can correlate pipeline events and supplier events (shared timeline).

Evidence examples

  • Monitoring dashboards + alert rules
  • Incident response plan with vendor contacts
  • Postmortems referencing supplier involvement
  • Advisory tracking tickets

8) Sub-processor visibility (supply chain depth)

Checklist

  • Supplier provides a current list of sub-processors.
  • Changes to sub-processors are notified and reviewed.
  • Critical sub-processors are risk assessed.
  • Data flows involving sub-processors are understood.
  • Contracts include sub-processor obligations (security & notification).

Evidence examples

  • Sub-processor list export
  • Risk review record
  • Data flow diagrams

9) Exit strategy testing (DR & BCP realism)

Checklist

  • You have a documented exit plan for each critical CI/CD supplier.
  • You can export source code, pipeline definitions, artifacts, logs.
  • You have a tested migration path (alternative CI/CD, registry, runner model).
  • You conduct exit tests (tabletop + technical drills) at defined intervals.
  • RTO/RPO expectations are documented and validated with evidence.

Evidence examples

  • Exit plan document
  • Export test logs and screenshots
  • DR exercise report
  • Migration proof-of-concept

Audit Table (Yes / No / Notes)

Control AreaCheckYesNoNotes / Evidence Link
InventorySupplier inventory complete (SDLC/CI/CD)
OwnershipBusiness + technical owner defined
ClassificationRisk tiering applied to CI/CD suppliers
ContractsSecurity obligations in contract
ContractsAudit rights / assurance mechanism
ContractsIncident notification SLA defined
ContractsExit clauses included
AccessSSO enforced (where possible)
AccessMFA mandatory for privileged accounts
AccessLeast privilege roles enforced
RunnersRunner isolation (no shared runners)
SecretsSecrets injected at runtime (vault)
Policy gatesMandatory approvals for prod
Policy gatesBlocking gates on critical findings
IntegrityArtifact signing enforced
IntegritySBOM generated automatically
EvidenceLogs retained per policy
EvidenceApproval records exportable
EvidenceTraceability commit→prod proven
MonitoringSupplier + pipeline anomalies monitored
Sub-processorsSub-processor visibility + review
Exit testingExit plan tested with evidence

Technical Implementation Guide

This checklist defines governance expectations.

For a practical engineering implementation guide (GitHub, GitLab, runner isolation, policy gates, artifact signing), see:
👉 Engineer Remediation Guide for CI/CD Supplier Controls

This companion article provides concrete configuration examples and implementation patterns.

Related Article