SAMMY works best on screens 1024px wide or larger.
V15.1.1
V15.1.1: Verify that application documentation defines risk based remediation time frames for 3rd party component versions with vulnerabilities and for updating libraries in general, to minimize the risk from these components.

Verify that application documentation defines risk based remediation time frames for 3rd party component versions with vulnerabilities and for updating libraries in general, to minimize the risk from these components.

ASVS Maturity
Description

Verify that application documentation defines risk based remediation time frames for 3rd party component versions with vulnerabilities and for updating libraries in general, to minimize the risk from these components.

V15.1.2
V15.1.2: Verify that an inventory catalog, such as software bill of materials (SBOM), is maintained of all third-party libraries in use, including verifying that components come from pre-defined, trusted, and continually maintained repositories.

Verify that an inventory catalog, such as software bill of materials (SBOM), is maintained of all third-party libraries in use, including verifying that components come from pre-defined, trusted, and continually maintained repositories.

ASVS Maturity
Description

Verify that an inventory catalog, such as software bill of materials (SBOM), is maintained of all third-party libraries in use, including verifying that components come from pre-defined, trusted, and continually maintained repositories.

V15.1.3
V15.1.3: Verify that the application documentation identifies functionality which is time-consuming or resource-demanding. This must include how to prevent a loss of availability due to overusing this functionality and how to avoid a situation where building a response takes longer than the consumer's timeout. Potential defenses may include asynchronous processing, using queues, and limiting parallel processes per user and per application.

Verify that the application documentation identifies functionality which is time-consuming or resource-demanding. This must include how to prevent a loss of availability due to overusing this functionality and how to avoid a situation where building a response takes longer than the consumer's timeout. Potential defenses may include asynchronous processing, using queues, and limiting parallel processes per user and per application.

ASVS Maturity
Description

Verify that the application documentation identifies functionality which is time-consuming or resource-demanding. This must include how to prevent a loss of availability due to overusing this functionality and how to avoid a situation where building a response takes longer than the consumer's timeout. Potential defenses may include asynchronous processing, using queues, and limiting parallel processes per user and per application.

V15.1.4
V15.1.4: Verify that application documentation highlights third-party libraries which are considered to be "risky components".

Verify that application documentation highlights third-party libraries which are considered to be "risky components".

ASVS Maturity
Description

Verify that application documentation highlights third-party libraries which are considered to be "risky components".

V15.1.5
V15.1.5: Verify that application documentation highlights parts of the application where "dangerous functionality" is being used.

Verify that application documentation highlights parts of the application where "dangerous functionality" is being used.

ASVS Maturity
Description

Verify that application documentation highlights parts of the application where "dangerous functionality" is being used.