Architecture

Le CI/CD comme système réglementé

Dans les environnements réglementés, les pipelines CI/CD ne sont pas de simples outils d’automatisation.
Ce sont des systèmes d’application.

L’architecture détermine si :

  • Les contrôles de sécurité sont obligatoires ou optionnels
  • Les politiques sont documentées ou appliquées
  • Evidence is manual or system-generated
  • Compliance is reactive or continuous

This is the foundational insight for auditors: architecture is where compliance becomes technical reality. A well-designed pipeline makes non-compliance structurally difficult. A poorly designed one makes it structurally inevitable.

New to these concepts? See our Glossary for plain-language definitions of CI/CD terms.


Why Architecture Comes First

Before discussing tools, frameworks, or audits, one principle must be clear:

If your architecture does not enforce controls, no checklist will save you.

A secure CI/CD architecture:

  • Empêche les changements non approuvés en production — via le RBAC obligatoire et les gates d’approbation
  • Bloque automatiquement les violations de politique — via l’application du policy-as-code
  • Génère des journaux traçables — pour chaque exécution de pipeline, approbation et déploiement
  • Préserve les preuves pour les régulateurs — avec des enregistrements immuables et horodatés
  • Soutient les exigences de sortie et de résilience — essentielles pour DORA et NIS2

Les contrôles doivent être intégrés dans le système — pas superposés.


Ce que les auditeurs doivent évaluer dans l’architecture CI/CD

Lors de l’examen de l’architecture CI/CD, les auditeurs doivent évaluer cinq questions clés :

QuestionCe à quoi ressemble une bonne pratiqueSignal d’alerte
Les étapes de sécurité peuvent-elles être ignorées ?Toutes les étapes obligatoires ; aucun contournement sans exception gouvernéeLes étapes peuvent être commentées ou désactivées par les développeurs
Qui peut déployer en production ?Déploiement restreint à des rôles spécifiques ; différent des auteurs du codeToute personne ayant accès au dépôt peut déclencher un déploiement en production
Les configurations de pipeline sont-elles protégées ?Définitions de pipeline dans le contrôle de version avec approbation des changementsConfigurations de pipeline modifiables sans revue ni piste d’audit
Les preuves sont-elles générées par le système ?Journaux, résultats de scan, enregistrements d’approbation produits automatiquementPreuves compilées manuellement avant les audits
Les exceptions sont-elles traçables ?Chaque contournement a une approbation documentée, une raison et une expirationAucun processus de gestion des exceptions ; suppressions non gouvernées

Pour une approche d’évaluation complète, consultez Comment les auditeurs examinent réellement les pipelines CI/CD.


Core Architectural Domains

Modern regulated CI/CD architectures rely on four foundational domains. Each domain addresses a distinct control objective that auditors verify independently.

1. Enforcement Layer

The enforcement layer is the control engine of the pipeline. It determines whether security is advisory or mandatory.

It ensures:

  • Mandatory approval workflows — no deployment without authorised review
  • Blocking policy gates — critical SAST/DAST/SCA findings prevent release
  • Secure build and artifact validation — signed, verified, traceable
  • Role-based deployment permissions — segregation of duties enforced by design
  • Exception governance with audit trails — every override documented and time-limited

Without enforcement, CI/CD becomes advisory. With enforcement, CI/CD becomes regulated.

Auditor insight: Ask to see a recent deployment that was blocked by a policy gate. If the organisation cannot produce one, enforcement may not be real.

Deep dives:

2. Secure SDLC Integration

Architecture must integrate security from plan to runtime — the shift-left principle embedded in pipeline design.

SDLC PhaseSecurity ControlEvidence Produced
PlanThreat modelling, security requirementsThreat model documents, security stories
CodeSAST, secrets scanning, code reviewScan logs, review approval records
BuildSCA, SBOM generation, artifact signingDependency reports, SBOM files, signatures
TestDAST, penetration testingDAST reports, test evidence
ReleasePolicy gate evaluation, approval workflowsGate pass/fail logs, approval records
DeployConfiguration validation, environment parityDeployment logs, config checksums
MonitorRuntime protection, incident detectionAlert logs, incident records

Secure SDLC is not a compliance slogan — it is an architectural pattern.

Deep dives:

3. Continuous Compliance Model

Regulated environments require compliance that is continuous, not periodic. The architecture must produce evidence automatically on every pipeline execution.

  • Repeatable control execution — same controls, every time, every pipeline
  • Evidence-by-design — logs, reports, and approval records generated as a byproduct of normal operations
  • Automated traceability — every deployment traceable to a specific commit, review, scan, and approval
  • Framework mapping — controls mapped to DORA, NIS2, ISO 27001, SOC 2, PCI DSS

A mature architecture produces compliance continuously — not quarterly.

Deep dives:

4. Security Domain Separation

Confusion often arises between overlapping security domains. Clear architecture prevents duplication and control gaps.

DomainFocusKey Concern for AuditorsHub Page
CI/CD GovernancePipeline controls, enforcement, accessAre controls mandatory and non-bypassable?Explore
Application SecurityCode-level controls (SAST, DAST, SCA)Is security testing integrated and enforced?Explore
DevSecOpsOperating models, roles, governanceWho owns security? How are decisions escalated?Explore
Regulatory FrameworksCompliance mapping and assuranceDo controls satisfy regulatory requirements?Explore
Audit & EvidenceEvidence validation, assessmentIs evidence trustworthy, complete, and retained?Explore

Understanding these domains prevents duplication and control gaps. Architecture ensures each domain has clear boundaries and responsibilities.

Deep dive: Security Domains Explained


Architectural Maturity Model

Regulated CI/CD systems typically evolve across four stages. Auditors can use this model to quickly assess an organisation’s maturity level.

LevelNameCharacteristicsRegulatory Readiness
1AutomationPipelines automate builds and deployments. Controls are optional. No evidence generation.Not audit-ready. Significant gaps across all frameworks.
2Security IntegrationSecurity tools integrated (SAST/DAST/SCA). Results advisory, not blocking. Some logging.Partially compliant. Evidence exists but enforcement is inconsistent.
3Enforced ControlsCritical controls block non-compliant releases. Segregation of duties. Systematic evidence.Audit-ready for most frameworks. Meets DORA/NIS2/ISO 27001 minimums.
4Regulated SystemFull traceability. Policy-as-code. Continuous compliance. Exit readiness. Predictive risk.Exceeds requirements. Continuous assurance model.

Regulated environments must operate at Level 3 or higher. Most regulatory frameworks (DORA, NIS2, ISO 27001) effectively require Level 3 as a minimum for certification or compliance.

For a structured self-assessment tool, see the DevSecOps Maturity Assessment Framework.


Architecture vs Tooling

Tools do not create architecture. Architecture defines how tools are governed.

Architecture DecidesTools Implement
Which controls are mandatoryHow scans are executed
Where enforcement occurs in the pipelineWhich vulnerabilities are detected
Which failures block releasesHow results are reported
How evidence is retained and protectedWhere logs are stored
Who can override policiesHow exceptions are technically processed

A strong architecture can change tools without losing control. A weak architecture depends entirely on vendor defaults.

For auditor guidance on tool governance, see CI/CD Security Tooling — Auditor’s Guide to Tool Categories and Controls.


Architecture & Regulatory Alignment

A well-designed CI/CD architecture supports multiple regulatory frameworks simultaneously. Rather than adapting architecture per regulation, design architecture once — map controls many times.

FrameworkArchitectural RequirementKey Articles/ControlsDeep Dive
DORAICT risk management, third-party control, resilience testingArt. 9, 21, 28Art. 21 Deep Dive
NIS2Supply chain security, incident readiness, risk managementArt. 21Art. 21 Controls Mapping
ISO 27001Change management, access control, secure developmentA.8.25, A.8.28, A.8.29Annex A Mapping
SOC 2Logical access, system operations, change managementCC6, CC7, CC8TSC Mapping
PCI DSSSecure development, access control, logging, testingReq. 6, 7, 8, 10, 11Req. 6 Deep Dive

For cross-framework analysis, see the ISO 27001 vs DORA vs NIS2 Controls Overlap Matrix.


Related Architecture Deep Dives


Final Principle

In regulated environments, delivery speed and control are not opposites. The right architecture makes them compatible.

If your pipeline is not designed as a control system, compliance will always be reactive. If your architecture enforces policy by design, compliance becomes continuous.


Related for Auditors

New to CI/CD auditing? Start with our Auditor’s Guide.