{"id":1306,"date":"2026-01-06T20:04:52","date_gmt":"2026-01-06T19:04:52","guid":{"rendered":"https:\/\/regulated-devsecops.com\/uncategorized\/dora-article-21-%e2%86%94-ci-cd-controls-mapping-2\/"},"modified":"2026-03-26T00:40:57","modified_gmt":"2026-03-25T23:40:57","slug":"dora-article-21-%e2%86%94-ci-cd-controls-mapping","status":"publish","type":"post","link":"https:\/\/regulated-devsecops.com\/fr\/regulatory-frameworks\/dora-article-21-%e2%86%94-ci-cd-controls-mapping\/","title":{"rendered":"DORA Article 21 \u2194 Cartographie des contr\u00f4les CI\/CD"},"content":{"rendered":"\n<p>Ce tableau met en correspondance les exigences de gestion des risques ICT de l&rsquo;article 21 de DORA avec des contr\u00f4les concrets de s\u00e9curit\u00e9 des pipelines CI\/CD.<br>Il soutient l&rsquo;interpr\u00e9tation r\u00e9glementaire, la pr\u00e9paration aux audits et les revues d&rsquo;impl\u00e9mentation technique.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Article 21(1) \u2014 Cadre de gestion des risques ICT<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Exigence DORA<\/strong><\/th><th><strong>Contr\u00f4le CI\/CD<\/strong><\/th><th><strong>Preuve g\u00e9n\u00e9r\u00e9e<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Identifier et \u00e9valuer les risques ICT<\/td><td>Tests de s\u00e9curit\u00e9 automatis\u00e9s (SAST, SCA, DAST)<\/td><td>Rapports de scan, journaux de pipeline<\/td><\/tr><tr><td>Pr\u00e9venir et att\u00e9nuer les risques ICT<\/td><td>Application des politiques et portes de pipeline<\/td><td>D\u00e9cisions de porte, approbations<\/td><\/tr><tr><td>D\u00e9tecter les activit\u00e9s anormales<\/td><td>Surveillance des pipelines et alertes<\/td><td>Journaux d&rsquo;alertes, \u00e9v\u00e9nements SIEM<\/td><\/tr><tr><td>R\u00e9pondre aux incidents ICT<\/td><td>Rollback contr\u00f4l\u00e9 et red\u00e9ploiements<\/td><td>Historique de d\u00e9ploiement<\/td><\/tr><tr><td>R\u00e9cup\u00e9rer apr\u00e8s les perturbations<\/td><td>Builds et releases reproductibles<\/td><td>M\u00e9tadonn\u00e9es de build<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Article 21(2)(a) \u2014 Contr\u00f4le d&rsquo;acc\u00e8s<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Exigence DORA<\/strong><\/th><th><strong>Contr\u00f4le CI\/CD<\/strong><\/th><th><strong>Preuve g\u00e9n\u00e9r\u00e9e<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Emp\u00eacher les acc\u00e8s non autoris\u00e9s<\/td><td>RBAC pour la configuration CI\/CD<\/td><td>Journaux de contr\u00f4le d&rsquo;acc\u00e8s<\/td><\/tr><tr><td>Prot\u00e9ger les op\u00e9rations privil\u00e9gi\u00e9es<\/td><td>Comptes de service au moindre privil\u00e8ge<\/td><td>Politiques IAM<\/td><\/tr><tr><td>S\u00e9curiser l&rsquo;acc\u00e8s administratif<\/td><td>MFA pour les administrateurs CI\/CD<\/td><td>Journaux d&rsquo;authentification<\/td><\/tr><tr><td>Contr\u00f4ler les identit\u00e9s d&rsquo;automatisation<\/td><td>Identit\u00e9s de pipeline s\u00e9par\u00e9es<\/td><td>Inventaire des identit\u00e9s<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Article 21(2)(b) \u2014 S\u00e9paration des fonctions<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Exigence DORA<\/strong><\/th><th><strong>Contr\u00f4le CI\/CD<\/strong><\/th><th><strong>Preuve g\u00e9n\u00e9r\u00e9e<\/strong><\/th><\/tr><\/thead><tbody><tr><td>S\u00e9parer les r\u00f4les en conflit<\/td><td>Exigences de revue de code<\/td><td>Historique des pull requests<\/td><\/tr><tr><td>Emp\u00eacher l&rsquo;auto-approbation<\/td><td>R\u00e8gles d&rsquo;approbation appliqu\u00e9es par le pipeline<\/td><td>Enregistrements d&rsquo;approbation<\/td><\/tr><tr><td>Contr\u00f4ler l&rsquo;autorit\u00e9 de release<\/td><td>Permissions de build et d\u00e9ploiement s\u00e9par\u00e9es<\/td><td>Cartographie des r\u00f4les de pipeline<\/td><\/tr><tr><td>Journaliser les contournements et exceptions<\/td><td>Journalisation des exceptions<\/td><td>Journaux d&rsquo;audit des contournements<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Article 21(2)(c) \u2014 Journalisation et surveillance<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Exigence DORA<\/strong><\/th><th><strong>Contr\u00f4le CI\/CD<\/strong><\/th><th><strong>Preuve g\u00e9n\u00e9r\u00e9e<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Surveiller l&rsquo;activit\u00e9 des syst\u00e8mes ICT<\/td><td>Journalisation compl\u00e8te de l&rsquo;ex\u00e9cution des pipelines<\/td><td>Journaux d&rsquo;ex\u00e9cution<\/td><\/tr><tr><td>D\u00e9tecter les \u00e9v\u00e9nements pertinents pour la s\u00e9curit\u00e9<\/td><td>Alertes de contr\u00f4les \u00e9chou\u00e9s et anomalies<\/td><td>Alertes de s\u00e9curit\u00e9<\/td><\/tr><tr><td>Conserver les journaux de mani\u00e8re s\u00e9curis\u00e9e<\/td><td>Stockage centralis\u00e9 des journaux<\/td><td>Configuration de r\u00e9tention<\/td><\/tr><tr><td>Supporter les investigations<\/td><td>Pistes d&rsquo;audit immuables<\/td><td>Journaux pr\u00eats pour l&rsquo;investigation<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Article 21(2)(d) \u2014 Gestion des changements et int\u00e9grit\u00e9<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Exigence DORA<\/strong><\/th><th><strong>Contr\u00f4le CI\/CD<\/strong><\/th><th><strong>Preuve g\u00e9n\u00e9r\u00e9e<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Contr\u00f4ler les changements aux syst\u00e8mes ICT<\/td><td>Pipelines CI\/CD obligatoires<\/td><td>Historique de d\u00e9ploiement<\/td><\/tr><tr><td>Assurer l&rsquo;int\u00e9grit\u00e9 des changements<\/td><td>Signature et v\u00e9rification des artefacts<\/td><td>M\u00e9tadonn\u00e9es de signature<\/td><\/tr><tr><td>Tracer les changements de bout en bout<\/td><td>Liaison source \u2192 pipeline \u2192 artefact<\/td><td>Enregistrements de provenance<\/td><\/tr><tr><td>Emp\u00eacher les d\u00e9ploiements non autoris\u00e9s<\/td><td>Portes de politique et approbations<\/td><td>Journaux d&rsquo;application des portes<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Article 21(2)(e) \u2014 R\u00e9silience, sauvegarde et reprise<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Exigence DORA<\/strong><\/th><th><strong>Contr\u00f4le CI\/CD<\/strong><\/th><th><strong>Preuve g\u00e9n\u00e9r\u00e9e<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Assurer la r\u00e9silience des syst\u00e8mes<\/td><td>Environnements de build durcis et isol\u00e9s<\/td><td>Configuration de l&rsquo;environnement<\/td><\/tr><tr><td>Pr\u00e9venir les points de d\u00e9faillance uniques<\/td><td>Composants CI\/CD redondants<\/td><td>Documentation d&rsquo;architecture<\/td><\/tr><tr><td>Activer les m\u00e9canismes de reprise<\/td><td>Workflows de rollback et red\u00e9ploiement<\/td><td>Journaux de reprise<\/td><\/tr><tr><td>Prot\u00e9ger les configurations<\/td><td>Sauvegarde s\u00e9curis\u00e9e de la configuration du pipeline<\/td><td>Enregistrements de sauvegarde<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Article 21(2)(f) \u2014 Am\u00e9lioration continue<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Exigence DORA<\/strong><\/th><th><strong>Contr\u00f4le CI\/CD<\/strong><\/th><th><strong>Preuve g\u00e9n\u00e9r\u00e9e<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Revoir la posture de risque ICT<\/td><td>Revues p\u00e9riodiques de s\u00e9curit\u00e9 des pipelines<\/td><td>Rapports de revue<\/td><\/tr><tr><td>Mettre \u00e0 jour les contr\u00f4les si n\u00e9cessaire<\/td><td>Modifications de configuration du pipeline<\/td><td>Journaux de changements<\/td><\/tr><tr><td>Am\u00e9liorer la d\u00e9tection et la pr\u00e9vention<\/td><td>Mises \u00e0 jour d&rsquo;outils et ajustement des r\u00e8gles<\/td><td>Historique des versions<\/td><\/tr><tr><td>S&rsquo;aligner sur les menaces en \u00e9volution<\/td><td>Mises \u00e0 jour de pipeline inform\u00e9es par les menaces<\/td><td>\u00c9valuations des risques<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Comment les auditeurs utilisent ce tableau<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Valider que les <strong>exigences de l&rsquo;article 21 sont techniquement appliqu\u00e9es<\/strong><\/li>\n\n\n\n<li>Identifier <strong>o\u00f9 le CI\/CD contribue \u00e0 la gestion des risques ICT<\/strong><\/li>\n\n\n\n<li>Demander des <strong>preuves sp\u00e9cifiques<\/strong> g\u00e9n\u00e9r\u00e9es par les pipelines<\/li>\n\n\n\n<li>\u00c9valuer la <strong>coh\u00e9rence et la reproductibilit\u00e9<\/strong> des contr\u00f4les<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Ressources associ\u00e9es<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\/fr\/uncategorized\/dora-article-21-deep-dive-enforcing-ict-risk-controls-via-ci-cd\/\" data-type=\"post\" data-id=\"252\">DORA Article 21 en profondeur<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\/fr\/uncategorized\/ci-cd-security-audit-compliance-mapping-iso-27001-soc-2-dora\/\" data-type=\"post\" data-id=\"235\">Audit de s\u00e9curit\u00e9 CI\/CD \u2014 Cartographie ISO 27001 \/ SOC 2 \/ DORA<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\/fr\/regulatory-frameworks\/dora-compliance-architecture-ci-cd-as-a-regulated-ict-system-2\/\" data-type=\"post\" data-id=\"274\">Architecture de conformit\u00e9 DORA<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\/compliance\/\" data-type=\"page\" data-id=\"17\">Conformit\u00e9<\/a><\/strong><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n    <section class=\"rds-author-box rds-author-box--audit\"\r\n             dir=\"ltr\" lang=\"fr\"\r\n             style=\"border:1px solid rgba(100,116,139,.35);border-radius:14px;padding:16px 18px;margin:26px 0 18px;background:rgba(148,163,184,.08);\">\r\n      <strong style=\"margin:0 0 8px; font-size:14px; font-weight:700; letter-spacing:.02em;\">Contexte \u201caudit-ready\u201d<\/strong>\r\n      <p style=\"margin:0; font-size:14px; line-height:1.55;\">Contenu con\u00e7u pour les environnements r\u00e9glement\u00e9s : contr\u00f4les avant outils, enforcement par politiques dans le CI\/CD, et evidence-by-design pour l\u2019audit.<\/p>\r\n      <p style=\"margin:0; font-size:14px; line-height:1.55;\">Focus sur la tra\u00e7abilit\u00e9, les approbations, la gouvernance des exceptions et la r\u00e9tention des preuves de bout en bout.<\/p>\r\n      <p style=\"margin:0; font-size:14px; line-height:1.55;\">\r\n        <a href=\"https:\/\/regulated-devsecops.com\/fr\/fr\/about\/\">Voir la m\u00e9thodologie sur la page About.<\/a>\r\n      <\/p>\r\n    <\/section>\r\n    \n","protected":false},"excerpt":{"rendered":"<p>Ce tableau met en correspondance les exigences de gestion des risques ICT de l&rsquo;article 21 de DORA avec des contr\u00f4les concrets de s\u00e9curit\u00e9 des pipelines CI\/CD.Il soutient l&rsquo;interpr\u00e9tation r\u00e9glementaire, la pr\u00e9paration aux audits et les revues d&rsquo;impl\u00e9mentation technique. Article 21(1) \u2014 Cadre de gestion des risques ICT Exigence DORA Contr\u00f4le CI\/CD Preuve g\u00e9n\u00e9r\u00e9e Identifier et &#8230; <a title=\"DORA Article 21 \u2194 Cartographie des contr\u00f4les CI\/CD\" class=\"read-more\" href=\"https:\/\/regulated-devsecops.com\/fr\/regulatory-frameworks\/dora-article-21-%e2%86%94-ci-cd-controls-mapping\/\" aria-label=\"En savoir plus sur DORA Article 21 \u2194 Cartographie des contr\u00f4les CI\/CD\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[126,123],"tags":[],"post_folder":[],"class_list":["post-1306","post","type-post","status-publish","format-standard","hentry","category-regulatory-frameworks","category-ci-cd-governance"],"_links":{"self":[{"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/posts\/1306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/comments?post=1306"}],"version-history":[{"count":0,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/posts\/1306\/revisions"}],"wp:attachment":[{"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/media?parent=1306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/categories?post=1306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/tags?post=1306"},{"taxonomy":"post_folder","embeddable":true,"href":"https:\/\/regulated-devsecops.com\/fr\/wp-json\/wp\/v2\/post_folder?post=1306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}