Skip to content

Audit Trail & Evidence

Evidence Collection Strategy

Every DORA-relevant activity is documented with verifiable evidence. The retention period is at least 5 years (Art. 19(6) DORA).

Automatic Evidence Collection

SourceEvidence TypeStorage LocationRetention
Git repositoryPolicy changes, reviews, approvalsGit historyUnlimited
CI/CD pipelineScan reports (vulnerability, SAST, dependency, IaC)Object storage5 years
SIEMSecurity events, incident logsLog storage5 years
MonitoringAvailability metrics, SLA evidenceObject storage5 years
LMSTraining certificates, attendance listsLMS DB + export5 years
CRMContract status, DORA compliance flagsCRM + export5 years
Pentest reportsExternal audit reportsEncrypted object storage5 years
BCP/DRP testsTest protocols, resultsGit + object storage5 years

Automated Compliance Report (Pseudocode)

Note

The following code is conceptual pseudocode describing the structure of the monthly compliance report. The actual implementation is adapted to the respective system landscape.

python
# Pseudocode – Conceptual structure of the monthly DORA compliance report

def generate_monthly_report():
    report = {
        "period": current_month(),
        "sections": {
            "asset_inventory": {
                "total_assets": cmdb.count_assets(),
                "classified_critical": cmdb.count_assets(tag="dora:critical"),
                "completeness_pct": cmdb.completeness_score()
            },
            "vulnerabilities": {
                "critical": vuln_scanner.count("critical"),
                "high": vuln_scanner.count("high"),
                "remediation_rate": vuln_scanner.remediation_rate(),
                "mean_time_to_remediate": vuln_scanner.mttr()
            },
            "incidents": {
                "total": siem.count_incidents(),
                "major": siem.count_incidents(classification="MAJOR"),
                "mean_detection_time": siem.mean_detection_time(),
                "sla_compliance": siem.sla_compliance_rate()
            },
            "testing": {
                "vuln_scans_executed": ci.count_scans("vulnerability"),
                "sast_scans_executed": ci.count_scans("sast"),
                "pentest_status": pentest.status(),
                "bcp_test_status": bcp.last_test_status()
            },
            "contracts": {
                "total_financial_customers": crm.count_financial_customers(),
                "dora_compliant_contracts": crm.count_dora_compliant(),
                "compliance_rate_pct": crm.dora_compliance_rate()
            },
            "awareness": {
                "training_completion_pct": lms.completion_rate(),
                "overdue_trainings": lms.count_overdue()
            }
        }
    }

    render_report(report, format=["markdown", "pdf"])
    distribute(report, recipients=["management", "compliance"])

Audit Readiness Package

For audits by clients, audit firms, or BaFin, BAUER GROUP provides a standardised, DORA-article-referenced audit package. The package is structured so that each audit area maps directly to the applicable regulatory requirements.

Package Structure

audit-package-[YYYY-MM]/

├── 00-management-summary/
│   ├── DORA-Compliance-Statement.pdf
│   ├── Scope-and-Applicability.pdf
│   └── Audit-Coordination-Contacts.pdf

├── 01-governance/                              ── Art. 5 DORA
│   ├── ICT-Risk-Management-Framework.pdf
│   ├── Governance-Structure-Orgchart.pdf
│   ├── Management-Board-Resolutions.pdf
│   ├── Role-Matrix-ICT-Responsibilities.pdf
│   └── Annual-Review-Evidence-[Year].pdf

├── 02-risk-management/                         ── Art. 6–16 DORA, RTS 2024/1774
│   ├── ICT-Risk-Analysis-[Year].pdf
│   ├── Asset-Inventory-Extract.csv
│   ├── Criticality-Classification.pdf
│   ├── ICT-Security-Policy.pdf
│   ├── Access-Control-Policy.pdf
│   ├── Cryptography-and-Encryption-Policy.pdf
│   ├── Backup-and-Recovery-Policy.pdf
│   ├── Patch-Management-Policy.pdf
│   ├── BCP-Plan.pdf
│   ├── DRP-Plan.pdf
│   └── Communication-Plan.pdf

├── 03-incident-management/                     ── Art. 17–23 DORA, RTS 2024/1772, RTS 2025/301
│   ├── Incident-Response-Playbook.pdf
│   ├── Classification-Schema-7-Criteria.pdf
│   ├── Escalation-Matrix.pdf
│   ├── SLA-Reporting-Deadlines-Documentation.pdf
│   ├── Pre-filled-XML-Template.xml
│   ├── Incident-Log-[Period].csv
│   └── Major-Incident-Reports/
│       └── [Incident-ID]-RCA-Report.pdf

├── 04-resilience-testing/                      ── Art. 24–27 DORA, RTS 2025/1190
│   ├── Test-Programme-Policy.pdf
│   ├── Vulnerability-Scan-Reports/
│   │   ├── Infrastructure-Scan-[Month].pdf
│   │   └── Container-Scan-[Month].pdf
│   ├── SAST-Reports/
│   │   └── SAST-Summary-[Quarter].pdf
│   ├── Pentest-Report-[Year].pdf
│   ├── BCP-DRP-Test-Protocol-[Year].pdf
│   └── Performance-Baseline-[Year].pdf

├── 05-third-party-risk/                        ── Art. 28–44 DORA, RTS 2024/1773, ITS 2024/2956
│   ├── DORA-Contract-Clauses-Template.pdf
│   ├── Contract-Compliance-Status-Matrix.csv
│   ├── Information-Register-Data-Package.json
│   ├── Subcontracting-Register.csv
│   ├── Exit-Strategy-Template.pdf
│   ├── Fact-Sheet-Template.pdf
│   └── Audit-Rights-Evidence.pdf

├── 06-awareness-and-communication/             ── Art. 13–14 DORA
│   ├── Awareness-Programme-Overview.pdf
│   ├── Training-Plan-[Year].pdf
│   ├── Attendance-Records-and-Certificates/
│   │   └── [Training]-Attendance-Confirmation.pdf
│   └── Communication-Plan-ICT-Incidents.pdf

├── 07-certifications-and-evidence/
│   ├── ISO-27001-Certificate.pdf
│   ├── SOC-2-Report.pdf (if applicable)
│   └── [Additional-Certificates].pdf

└── 08-appendix/
    ├── DORA-Article-Index-Mapping.pdf
    ├── Glossary.pdf
    └── Audit-Package-Change-History.pdf

Article Mapping per Audit Area

Audit AreaDORA ArticlesRTS/ITSEvidence
GovernanceArt. 5Framework, board resolutions, role matrix
ICT Risk ManagementArt. 6–16RTS 2024/1774Risk analysis, policies, asset inventory, BCP/DRP
Incident ManagementArt. 17–23RTS 2024/1772, RTS 2025/301, ITS 2025/302Playbook, classification, reporting deadlines, incident log
Resilience TestingArt. 24–27RTS 2025/1190Test programme, scan reports, pentest, BCP test
Third-Party RiskArt. 28–44RTS 2024/1773, ITS 2024/2956, RTS 2025/532Contracts, register, subcontracting, exit strategy
AwarenessArt. 13–14Training plan, attendance records
Information SharingArt. 45Participation records (if applicable)

Provision Process

StepDescriptionCadence
1. Automatic evidence collectionCI/CD, SIEM, monitoring, CRM exportsContinuous
2. ConsolidationAssembly into package structureMonthly
3. Quality reviewReview by compliance officerQuarterly
4. VersioningAudit package as versioned releaseSemi-annually
5. Provision upon requestClient-specific compilation within 5 business daysOn request

Confidentiality

The audit package contains security-sensitive information. Provision is exclusively via encrypted channels. Recipients are documented. Pentest reports and vulnerability scans are only shared with third parties in redacted form.

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT