Risque tiers dans les pipelines CI/CD sous DORA Article 28

DORA Article 28 exige des entités financières qu’elles gèrent les risques introduits par les fournisseurs de services ICT tiers.

Dans la livraison logicielle moderne, les pipelines CI/CD figurent parmi les systèmes les plus dépendants de tiers de l’organisation.

Les plateformes Git, les runners CI, les plugins et les registres d’artefacts ne sont pas de simples choix d’outils — ce sont des services externes intégrés qui influencent directement l’intégrité logicielle, la disponibilité et la résilience opérationnelle.

Cet article se concentre spécifiquement sur le risque tiers au sein des pipelines CI/CD, expliquant où ces risques surviennent, comment DORA Article 28 s’applique, et quels contrôles les auditeurs s’attendent à voir appliqués.

DORA Article 28 — Tools → Controls → Evidence Diagramme liant les outils DevSecOps d’entreprise aux contrôles CI/CD applicables et aux preuves d’audit résultantes, avec les exigences transversales de gouvernance tierce DORA Article 28. Tools → Controls → Evidence Vue DORA Article 28 : gouvernance ICT tierce appliquée via les contrôles CI/CD et les preuves démontrables. TRANSVERSAL (ARTICLE 28) Gouvernance fournisseurs Clauses contractuelles Monitoring Sortie plan Evidence retention MAPPING LAYER Tools Platforms & services Controls Enforced requirements Evidence What auditors verify TOOLS Git / Source Hosting CI/CD Orchestrator + Runners Registries + Dépendances Cloud Runtime + Observability CONTROLS Access control + MFA + SoD Approvals + policy gates Integrity: SBOM + signing + provenance Monitoring + incident workflows EVIDENCE Audit logs + access reviews Approvals & change traceability SBOM + attestations + signatures Monitoring data + incident records Tip: Under DORA Article 28, tools are acceptable only if they enforce controls and continuously produce auditable evidence.
Diagramme liant les outils DevSecOps d’entreprise aux contrôles CI/CD applicables et aux preuves d’audit résultantes, avec les exigences transversales de gouvernance tierce DORA Article 28.

Why CI/CD Pipelines Are a Third-Party Risk Concentration Point

CI/CD pipelines aggregate multiple external dependencies into a single execution flow:

  • source code is hosted externally,
  • builds often run on shared or managed infrastructure,
  • third-party code is pulled automatically,
  • artifacts are stored and distributed by external services.

From a DORA perspective, CI/CD pipelines represent:

  • high-impact ICT dependencies,
  • with privileged access,
  • operating at machine speed,
  • and capable of propagating failures or compromises directly into production.

As a result, CI/CD platforms must be treated as in-scope ICT third-party services under Article 28.

CI/CD Red Flags — DORA Article 28 (Third-Party Risk) Enterprise CI/CD diagram highlighting common DORA Article 28 third-party risk red flags: missing exit plan, shared runners, lack of sub-processor visibility, missing audit rights, and missing evidence retention. CI/CD Red Flags — DORA Article 28 Third-party risk failures auditors frequently flag in Git, CI/CD SaaS, runners, registries, and cloud runtime. TRANSVERSAL (ARTICLE 28) Gouvernance fournisseurs Audit rights Sortie strategy Evidence retention Git Hosting GitHub / GitLab SaaS No audit rights CI/CD SaaS Orchestrator No exit plan CI Runners Cloud execution Shared runners Registries Artifacts + images No retention Cloud Runtime Prod services No sub-processor view ENGINEER REMEDIATION HINTS Tested exit strategy (CI/CD) Dedicated / isolated runners Supplier + sub-processor map Centralized logs + retention Auditor rule: if controls cannot produce time-bound evidence on demand, they are treated as ineffective under Article 28. Focus areas: CI/CD platform scope, contractual auditability, runner isolation, sub-processor governance, and evidence retention.
Enterprise CI/CD diagram highlighting common DORA Article 28 third-party risk red flags: missing exit plan, shared runners, lack of sub-processor visibility, missing audit rights, and missing evidence retention.

GitHub / GitLab SaaS as ICT Third-Party Providers

Risk exposure

GitHub and GitLab SaaS platforms control:

  • access to source code,
  • change approval workflows,
  • identity and permission enforcement.

Compromise or misconfiguration can lead to:

  • unauthorized code changes,
  • bypassed approvals,
  • loss of traceability.

Article 28 expectations

Auditors expect:

  • Git hosting platforms listed in the third-party inventory,
  • clear risk classification (often critical),
  • enforcement of segregation of duties,
  • evidence of access control and approvals.

Access logs, pull request approvals, and branch protection settings are treated as audit evidence, not operational details.


Cloud-Based CI Runners

Risk exposure

Managed or cloud-hosted CI runners:

  • execute untrusted code,
  • access secrets and credentials,
  • interact with internal and external systems.

They often run on shared infrastructure, increasing exposure.

Article 28 expectations

Under Article 28, organizations must demonstrate:

  • isolation between runners,
  • controlled access to secrets,
  • monitoring of execution environments,
  • ability to restrict or revoke runner access.

Auditors frequently ask:

“Who controls the execution environment where your code is built?”


Marketplace Actions and Plugins

Risk exposure

CI/CD marketplaces introduce unvetted third-party code directly into pipelines.

Risks include:

  • supply chain attacks,
  • malicious updates,
  • lack of version control,
  • unclear ownership.

Article 28 expectations

Auditors expect:

  • governance over which plugins are allowed,
  • risk assessment for critical actions,
  • version pinning and review processes,
  • monitoring of changes over time.

Unrestricted marketplace usage is often flagged as a major Article 28 weakness.


Artifact Registries

Risk exposure

Registres d’artefacts store and distribute:

  • build outputs,
  • container images,
  • internal libraries.

If compromised, they can:

  • propagate malicious artifacts,
  • break deployment integrity,
  • affect multiple systems simultaneously.

Article 28 expectations

Auditors expect controls covering:

  • access restrictions,
  • immutability policies,
  • artifact signing and verification,
  • retention of artifact metadata.

Registres d’artefacts are treated as core supply chain components, not passive storage.


Dependency Proxies and External Repositories

Risk exposure

Dependency proxies and external repositories:

  • pull code from outside the organization,
  • introduce indirect third-party dependencies,
  • may change content without notice.

This creates hidden third-party exposure.

Article 28 expectations

Auditors expect:

  • visibility into dependency sources,
  • controls to restrict or cache external dependencies,
  • traceability linking dependencies to builds,
  • monitoring of dependency changes.

SBOMs and dependency logs are often reviewed as Article 28 evidence.


Core CI/CD Controls Expected Under Article 28

Across all CI/CD-related third-party services, auditors expect to see:

  • explicit inclusion in third-party inventories,
  • risk-based classification and governance,
  • access isolation and least privilege,
  • enforceable policies (approvals, gates),
  • continuous monitoring,
  • automated evidence generation.

CI/CD pipelines should enforce these controls by design, not via manual procedures.


Evidence Auditors Commonly Request

For CI/CD third-party risk, auditors frequently request:

  • access logs from Git platforms,
  • CI execution logs and runner metadata,
  • approval records and policy gate results,
  • artifact signing and provenance data,
  • monitoring alerts involving CI/CD services.

These artefacts are used to validate that controls are operating, not just defined.


Relationship with Other DORA Article 28 Controls

CI/CD pipelines often act as the enforcement layer for:

  • contractual requirements,
  • security policies,
  • exit strategy constraints.

They bridge legal, security, and engineering domains — making them central to Article 28 compliance.


Key Takeaway

Under DORA Article 28, CI/CD pipelines are not neutral automation tools.

They are high-risk ICT third-party integration points.

Organizations that:

  • explicitly govern CI/CD third-party services,
  • enforce controls within pipelines,
  • and generate continuous evidence

are significantly better positioned to pass Article 28 audits and manage real operational risk.


Related Content


Contexte “audit-ready”

Contenu conçu pour les environnements réglementés : contrôles avant outils, enforcement par politiques dans le CI/CD, et evidence-by-design pour l’audit.

Focus sur la traçabilité, les approbations, la gouvernance des exceptions et la rétention des preuves de bout en bout.

Voir la méthodologie sur la page About.