Supplier Governance & CI/CD Controls Checklist

Third-Party ICT Risk Controls for Regulated CI/CD Pipelines Why this checklist exists In regulated environments, suppliers are not “external.” They are part of your delivery system. When third-party services support your SDLC (Git hosting, CI/CD SaaS, artifact registries, cloud runtime, security scanners), auditors expect you to demonstrate: This checklist is designed to be used by … Read more

DORA Article 28 Architecture: Third-Party ICT Risk Controls Across CI/CD and Cloud

DORA Article 28 requires regulated organizations to treat ICT third-party providers as part of their operational risk perimeter. In practice, this means your CI/CD and cloud delivery chain must be designed so that: This page provides a practical architecture view: where third-party dependencies sit, which controls apply, and what evidence you should be able to … Read more