{"id":1998,"date":"2025-12-31T00:33:44","date_gmt":"2025-12-30T23:33:44","guid":{"rendered":"https:\/\/regulated-devsecops.com\/uncategorized\/auditoria-de-seguridad-ci-cd-mapeo-de-cumplimiento-iso-27001-soc-2-dora\/"},"modified":"2026-03-26T09:30:46","modified_gmt":"2026-03-26T08:30:46","slug":"ci-cd-security-audit-compliance-mapping-iso-27001-soc-2-dora","status":"publish","type":"post","link":"https:\/\/regulated-devsecops.com\/es\/ci-cd-governance-es\/ci-cd-security-audit-compliance-mapping-iso-27001-soc-2-dora\/","title":{"rendered":"Auditor\u00eda de Seguridad CI\/CD \u2014 Mapeo de Cumplimiento (ISO 27001 \/ SOC 2 \/ DORA)"},"content":{"rendered":"\n<p>Esta tabla de auditor\u00eda orientada al <a href=\"https:\/\/regulated-devsecops.com\/compliance\/\" data-type=\"page\" data-id=\"17\">cumplimiento normativo<\/a> mapea los controles de <a href=\"https:\/\/regulated-devsecops.com\/es\/ci-cd-security\/\" data-type=\"page\" data-id=\"11\">seguridad CI\/CD<\/a> con marcos regulatorios y de aseguramiento comunes.<br>Est\u00e1 dise\u00f1ada para apoyar auditor\u00edas internas, evaluaciones externas y la preparaci\u00f3n regulatoria en entornos empresariales.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd10 Gesti\u00f3n de Identidad y Acceso (IAM)<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Control<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>ISO 27001<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>SOC 2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>DORA<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>S\u00ed<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>No<\/strong><\/th><\/tr><\/thead><tbody><tr><td>M\u00ednimo privilegio aplicado a cuentas de servicio CI\/CD<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.2 \/ A.5.15<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.1<\/td><td class=\"has-text-align-center\" data-align=\"center\">Gesti\u00f3n de Riesgos ICT<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Segregaci\u00f3n entre identidades humanas y del pipeline<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.6.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">Gobernanza<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Acceso basado en roles para la configuraci\u00f3n del pipeline<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.18<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Control de Acceso<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>MFA aplicado a los administradores de CI\/CD<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.17<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.1<\/td><td class=\"has-text-align-center\" data-align=\"center\">Seguridad ICT<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Aprobaci\u00f3n requerida para acciones privilegiadas del pipeline<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.19<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Gesti\u00f3n de Cambios<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd11 Gesti\u00f3n de Secretos<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Control<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>ISO 27001<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>SOC 2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>DORA<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>S\u00ed<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>No<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Secretos no almacenados en el control de c\u00f3digo fuente<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.12<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.1<\/td><td class=\"has-text-align-center\" data-align=\"center\">Seguridad ICT<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Inyecci\u00f3n de secretos en tiempo de ejecuci\u00f3n<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.24<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.7<\/td><td class=\"has-text-align-center\" data-align=\"center\">Gesti\u00f3n de Riesgos ICT<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Secretos con \u00e1mbito por entorno<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.15<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Gobernanza<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Rotaci\u00f3n peri\u00f3dica de secretos<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.15<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.1<\/td><td class=\"has-text-align-center\" data-align=\"center\">Seguridad ICT<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Valores de secretos excluidos de los registros<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.16<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Monitoreo<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udce6 Integridad de Artefactos y Cadena de Suministro de Software<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Control<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>ISO 27001<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>SOC 2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>DORA<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>S\u00ed<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>No<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Entornos de compilaci\u00f3n CI\/CD reforzados<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.20<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.6<\/td><td class=\"has-text-align-center\" data-align=\"center\">Resiliencia ICT<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Firma de artefactos aplicada<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.23<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">Cadena de Suministro<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Procedencia que vincula c\u00f3digo, pipeline y artefacto<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.9<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Trazabilidad<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Los repositorios de artefactos aplican inmutabilidad<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.10<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.5<\/td><td class=\"has-text-align-center\" data-align=\"center\">Seguridad ICT<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Promoci\u00f3n limitada a artefactos de confianza<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.21<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.6<\/td><td class=\"has-text-align-center\" data-align=\"center\">Gesti\u00f3n de Cambios<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd17 Integraciones de Terceros y CI\/CD<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Control<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>ISO 27001<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>SOC 2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>DORA<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>S\u00ed<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>No<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Plugins CI\/CD de terceros aprobados formalmente<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.22<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">Riesgo de Terceros<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Integraciones fijadas a versiones espec\u00edficas<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.8<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">Cadena de Suministro<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Verificaci\u00f3n de integridad de acciones externas<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.23<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">Seguridad ICT<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Restricci\u00f3n de plugins mantenidos por la comunidad<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.23<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.6<\/td><td class=\"has-text-align-center\" data-align=\"center\">Gesti\u00f3n de Riesgos<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Monitoreo del uso de integraciones<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.16<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Monitoreo<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udcca Registro, Monitoreo y Evidencias de Auditor\u00eda<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Control<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>ISO 27001<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>SOC 2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>DORA<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>S\u00ed<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>No<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Actividad del pipeline CI\/CD completamente registrada<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.15<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Monitoreo<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Los registros incluyen aprobaciones y comprobaciones de seguridad<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.14<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">Gobernanza<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Recopilaci\u00f3n centralizada de registros<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.16<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Gesti\u00f3n de Riesgos ICT<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Retenci\u00f3n de registros alineada con la pol\u00edtica<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.34<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.4<\/td><td class=\"has-text-align-center\" data-align=\"center\">Mantenimiento de Registros<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>La evidencia apoya auditor\u00edas e investigaciones<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.31<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC2.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Cumplimiento<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udee1\ufe0f Gesti\u00f3n de Cambios y Gobernanza<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Control<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>ISO 27001<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>SOC 2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>DORA<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>S\u00ed<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>No<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Cambios revisados y aprobados a trav\u00e9s del pipeline<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.8.32<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC8.1<\/td><td class=\"has-text-align-center\" data-align=\"center\">Gesti\u00f3n de Cambios<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Separaci\u00f3n entre roles de compilaci\u00f3n e implementaci\u00f3n<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.6.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC6.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">Gobernanza<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Aplicaci\u00f3n de pol\u00edticas a trav\u00e9s de puertas automatizadas<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.19<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC7.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Seguridad ICT<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Excepciones aprobadas y registradas formalmente<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.31<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC2.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">Cumplimiento<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Gobernanza CI\/CD revisada peri\u00f3dicamente<\/td><td class=\"has-text-align-center\" data-align=\"center\">A.5.36<\/td><td class=\"has-text-align-center\" data-align=\"center\">CC1.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Supervisi\u00f3n<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">C\u00f3mo Utilizar Esta Tabla de Auditor\u00eda de Cumplimiento<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Usar durante <strong>auditor\u00edas internas de ISO 27001<\/strong><\/li>\n\n\n\n<li>Adjuntar a <strong>evaluaciones de preparaci\u00f3n para SOC 2<\/strong><\/li>\n\n\n\n<li>Apoyar la <strong>evidencia de gesti\u00f3n de riesgos ICT de DORA<\/strong><\/li>\n\n\n\n<li>Hacer seguimiento de las acciones de remediaci\u00f3n en la columna <strong>Notas<\/strong><\/li>\n\n\n\n<li>Revisar peri\u00f3dicamente a medida que los pipelines CI\/CD evolucionan<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Recursos Relacionados<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\/es\/ci-cd-security\/\" data-type=\"page\" data-id=\"11\">CI\/CD Security<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\/es\/ci-cd-governance-es\/ci-cd-security-checklist-for-enterprises\/\" data-type=\"post\" data-id=\"32\">CI\/CD Security Checklist for Enterprises<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\/es\/devsecops\/\" data-type=\"page\" data-id=\"13\">DevSecOps<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\/compliance\/\" data-type=\"page\" data-id=\"17\">Compliance<\/a><\/strong><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n    <section class=\"rds-author-box rds-author-box--audit\"\r\n             dir=\"ltr\" lang=\"es\"\r\n             style=\"border:1px solid rgba(100,116,139,.35);border-radius:14px;padding:16px 18px;margin:26px 0 18px;background:rgba(148,163,184,.08);\">\r\n      <strong style=\"margin:0 0 8px; font-size:14px; font-weight:700; letter-spacing:.02em;\">Contexto \u201caudit-ready\u201d<\/strong>\r\n      <p style=\"margin:0; font-size:14px; line-height:1.55;\">Contenido pensado para entornos regulados: controles antes que herramientas, enforcement en CI\/CD y evidencia por dise\u00f1o para auditor\u00edas.<\/p>\r\n      <p style=\"margin:0; font-size:14px; line-height:1.55;\">Enfoque en trazabilidad, aprobaciones, gobernanza de excepciones y retenci\u00f3n de evidencia de extremo a extremo.<\/p>\r\n      <p style=\"margin:0; font-size:14px; line-height:1.55;\">\r\n        <a href=\"https:\/\/regulated-devsecops.com\/es\/es\/about\/\">Ver la metodolog\u00eda en la p\u00e1gina About.<\/a>\r\n      <\/p>\r\n    <\/section>\r\n    \n","protected":false},"excerpt":{"rendered":"<p>Tabla de auditor\u00eda de cumplimiento que mapea los controles de seguridad CI\/CD con ISO 27001, SOC 2 y DORA para apoyar auditor\u00edas internas, evaluaciones externas y la preparaci\u00f3n regulatoria.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[132,133,135],"tags":[],"post_folder":[],"class_list":["post-1998","post","type-post","status-publish","format-standard","hentry","category-ci-cd-governance-es","category-cross-regulation-comparisons-es","category-regulatory-frameworks-es"],"_links":{"self":[{"href":"https:\/\/regulated-devsecops.com\/es\/wp-json\/wp\/v2\/posts\/1998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/regulated-devsecops.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/regulated-devsecops.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/regulated-devsecops.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/regulated-devsecops.com\/es\/wp-json\/wp\/v2\/comments?post=1998"}],"version-history":[{"count":0,"href":"https:\/\/regulated-devsecops.com\/es\/wp-json\/wp\/v2\/posts\/1998\/revisions"}],"wp:attachment":[{"href":"https:\/\/regulated-devsecops.com\/es\/wp-json\/wp\/v2\/media?parent=1998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/regulated-devsecops.com\/es\/wp-json\/wp\/v2\/categories?post=1998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/regulated-devsecops.com\/es\/wp-json\/wp\/v2\/tags?post=1998"},{"taxonomy":"post_folder","embeddable":true,"href":"https:\/\/regulated-devsecops.com\/es\/wp-json\/wp\/v2\/post_folder?post=1998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}