Home
Browse frameworks
Contact us
SAMMY premium
Login
SAMMY UI is optimized for resolutions with a width 1024px and higher.
CIS Critical Security Controls
Browse CIS Critical...
SAMM
OpenSAMM1.5
Cybersecurity Fundamentals
NIST CSF 2.0
NIST SSDF
NIST 800-34
DSOMM
BSIMM 14
ISO 27001:2022 CMMI
CIS Critical Security Controls
Inventory and Control of Enterprise Assets
Inventory and Control of Software Assets
Data Protection
Secure Configuration of Enterprise Assets and Software
Account Management
Access Control Management
Continuous Vulnerability Management
Audit Log Management
Email and Web Browser Protections
Malware Defenses
Data Recovery
Network Infrastructure Management
Network Monitoring and Defense
Security Awareness and Skills Training
Service Provider Management
Application Software Security
Incident Response Management
Penetration Testing
16,1: Establish and Maintain a Secure Application DevelopmentĀ Process
16,2: Establish and Maintain a Process to Accept and Address Software Vulnerabilities
16,3: Perform Root Cause Analysis on Security Vulnerabilities
16,4: Establish and Manage an Inventory of Third-Party Software Components
16,5: Use Up-to-Date and Trusted Third-Party Software Components
16,6: Establish and Maintain a Severity Rating System and Process for Application Vulnerabilities
16,7: Use Standard Hardening Configuration Templates for Application Infrastructure
16,8: Separate Production and Non-Production Systems
16,9: Train Developers in Application Security Concepts and Secure Coding
16,10: Apply Secure Design Principles in Application Architectures
16,11: Leverage Vetted Modules or Services for Application Security Components
16,12: Implement Code-Level Security Checks
16,13: Conduct Application Penetration Testing
16,14: Conduct Threat Modeling
Separate Production and Non-Production Systems
16,8: Separate Production and Non-Production Systems
Policy defined
Not applicable - Not applicable
None - None
Informal - Informal
Partially written - Partially written
Written - Written
Approved and communicated - Approved and communicated
Not applicable
None
Informal
Partially written
Written
Approved and communicated
Control implemented
Not applicable - Not applicable
Not implemented - Not implemented
Parts of policy implemented - Parts of policy implemented
Implemented on some systems - Implemented on some systems
Implemented on most systems - Implemented on most systems
Implemented on all systems - Implemented on all systems
Not applicable
Not implemented
Parts of policy implemented
Implemented on some systems
Implemented on most systems
Implemented on all systems
Control automated
Not applicable - Not applicable
Not automated - Not automated
Parts of policy automated - Parts of policy automated
Automated on some systems - Automated on some systems
Automated on most systems - Automated on most systems
Automated on all systems - Automated on all systems
Not applicable
Not automated
Parts of policy automated
Automated on some systems
Automated on most systems
Automated on all systems
Control reported
Not applicable - Not applicable
Not reported - Not reported
Parts of policy reported - Parts of policy reported
Reported on some systems - Reported on some systems
Reported on most systems - Reported on most systems
Reported on all systems - Reported on all systems
Not applicable
Not reported
Parts of policy reported
Reported on some systems
Reported on most systems
Reported on all systems
Description
Maintain separate environments for production and non-production systems.