SAMMY UI is optimized for resolutions with a width 1024px and higher.
V12.3.1
V12.3.1: Verify that an encrypted protocol such as TLS is used for all inbound and outbound connections to and from the application, including monitoring systems, management tools, remote access and SSH, middleware, databases, mainframes, partner systems, or external APIs. The server must not fall back to insecure or unencrypted protocols.
ASVS Maturity
V12.3.2
V12.3.2: Verify that TLS clients validate certificates received before communicating with a TLS server.
ASVS Maturity
V12.3.3
V12.3.3: Verify that TLS or another appropriate transport encryption mechanism used for all connectivity between internal, HTTP-based services within the application, and does not fall back to insecure or unencrypted communications.
ASVS Maturity
V12.3.4
V12.3.4: Verify that TLS connections between internal services use trusted certificates. Where internally generated or self-signed certificates are used, the consuming service must be configured to only trust specific internal CAs and specific self-signed certificates.
ASVS Maturity
V12.3.5
V12.3.5: Verify that services communicating internally within a system (intra-service communications) use strong authentication to ensure that each endpoint is verified. Strong authentication methods, such as TLS client authentication, must be employed to ensure identity, using public-key infrastructure and mechanisms that are resistant to replay attacks. For microservice architectures, consider using a service mesh to simplify certificate management and enhance security.
ASVS Maturity