Stop screenshotting your Git logs.

Turn your engineering workflows into DORA evidence.

Connect GitHub, Jira, and CI/CD to continuously collect evidence for DORA development, testing, and change controls.

Read-only · No source code stored

DORA: mandatory since January 2025
The problem

Security Teams spend weeks collecting engineering evidence for the next Audit

Every audit cycle, teams manually gather pull request approvals, branch protection settings, CI/CD test runs, and ticket-to-fix history. It is repetitive, error-prone, and hard to verify under pressure.

PR approvals and branch rules

Manual exports of approvals, branch protection, and merge history for every audit cycle.

CI/CD and ticket evidence stitching

Pulling Jira issues, pipeline runs, and remediation updates into one audit file.

Repeats every audit

The same manual process restarts every cycle and gets worse as teams and repos grow.

Gaps during review

Evidence gets missed, timelines slip, and follow-up questions increase.

Our Solution

Continuous Engineering Evidence

deploy.yml
on: push · main
build
32s
test
20s
scan
44s
Generating evidence
in progress
Evidence releasedEVD-12345
TIMESTAMP2024-05-15 10:32STATUSCOMPLIANTEVENTDEPLOY SUCCESS
How it works

From engineering activity to DORA evidence.

01

Connect to your Repo

Link your repository with read-only access.

GitHubGitLabBitBucket
02

Run the control tests

Capture PR approvals, branch rules, pipeline runs, ticket links, and remediation history as evidence objects mapped to DORA controls.

PR approvalsBranch rulesPipeline runsTicket-to-fix
03

Export Results

Generate a structured export with supporting records, timestamps, and traceability for audit and internal review.

PDF exportJSON exportDORA controlsReview-ready
Features

Engineering evidence for DORA

queued

Engineering evidence collection

Collect pull request approvals, branch protection snapshots, pipeline runs, ticket links, and remediation history from the tools your team already uses.

Remediation traceability

Link findings, tickets, fixes, and verification steps into a traceable evidence trail.

One-click evidence export

Export a structured evidence pack for a selected period, ready for audit prep and internal review.

DORA control mapping

See which development, testing, and change controls have evidence and where gaps remain.

Integrations

Start with the tools your team already uses

Read-only access. No source code stored. We collect metadata such as approvals, timestamps, pipeline outcomes, and ticket links.

Available

GitHub

PR reviews, branch protection rules, merge policies, Dependabot and code scanning alerts.

Pull request approvals
Branch protection snapshots
Vulnerability alerts
Merge history
Available

Jira

Issue tracking, vulnerability ticket lifecycle, remediation workflows, and sprint evidence.

Ticket creation & resolution
Vulnerability fix cycles
Time-to-remediate metrics
Sprint audit trail
Available

GitHub Actions

CI/CD pipeline runs, security scan results, deployment gates, and workflow execution records.

Pipeline run outcomes
Security scan results
Deployment gate logs
Workflow timestamps

Try it on a popular open-source repo

Paste any public repo URL and get an instant DORA compliance report — branch protection, CI/CD, secret scanning, vulnerability management, and more.

Free scan →

Coming next: Azure DevOps

Regulatory urgency

DORA is now in force. The challenge is proving engineering controls continuously.

The Digital Operational Resilience Act became mandatory for all EU financial entities in January 2025. Swedish regulated software companies are already subject to oversight by Finansinspektionen. The question is no longer whether you need to comply: it's whether you can prove it.

Non-compliance risk

DORA Art. 50 authorizes national regulators to impose administrative sanctions and remedial measures on non-compliant financial entities, including regulated software companies and payment service providers.

January 2025
DORA is live
All EU financial entities must comply with Art. 5–55, including development controls (RTS 2024/1774 Art. 16–17). Enforcement has already begun.
Ongoing
Supervisory reviews
National competent authorities (Finansinspektionen in Sweden) are conducting assessments. Companies must produce engineering evidence on demand.
Next cycle
Your next audit
Manual collection takes weeks. Norigen makes it continuous: so you are always ready, not scrambling.
Framework coverage

What Norigen covers

Norigen is focused on development process evidence: the controls that live in your Git history, CI pipelines, and ticket tracker. Not infrastructure. Not policy documents.

DORA
Digital Operational Resilience Act
Available now

Mandatory for all EU financial entities since January 2025. Norigen covers the development process controls: the ones your team produces evidence for with every PR, pipeline run, and ticket.

Pull request approvals and reviewer records
Branch protection rule snapshots
CI/CD pipeline run outcomes and security gates
Ticket-to-fix traceability (vulnerability lifecycle)
Remediation history and time-to-fix metrics

NIS2 mapping is also on the roadmap: once the Swedish national transposition is final, your existing evidence will cover it automatically.

Stop screenshotting your Git logs.

Connect your CI/CD tools. Ensure traceability by DORA.

Read-only access • No source code stored • Fast setup