SAMMY UI is optimized for resolutions with a width 1024px and higher.
Application and Interface Security Policy and Procedures
AIS-01: Are application security policies and procedures established, documented, approved, communicated, applied, evaluated, and maintained to guide appropriate planning, delivery, and support of the organization's application security capabilities?
The policy should:

a. Include defined roles and responsibilities supported by regular workforce training.
b. Align with organizational purpose and strategy.
c. Provide a framework for setting application security baselines (e.g., NIST, ISO, OWASP, and CIS benchmarks).
d. Guide the development of application security controls.
e. Include a commitment to satisfy applicable requirements and continual improvement.
f. Cover all relevant applications regardless of whether they are developed in-house or via one’s supply chain.
g. Promote the use of an established software development lifecycle (SDLC) in software development, including code review, secure coding training, testing (functional, regression, security, etc.), vulnerability testing, and change management.
h. Ensure vulnerability processes are followed with regular patching, scanning, and remediation before production deployment.
i. Be reviewed by management periodically or after significant changes.
Control implemented
Control ownership
Description

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for application security to provide guidance to the appropriate planning, delivery and support of the organization's application security capabilities. Review and update the policies and procedures at least annually.

Application and Interface Security Policy and Procedures
AIS-01: Are application security policies and procedures reviewed and updated at least annually?
The policy should:

a. Include defined roles and responsibilities supported by regular workforce training.
b. Align with organizational purpose and strategy.
c. Provide a framework for setting application security baselines (e.g., NIST, ISO, OWASP, and CIS benchmarks).
d. Guide the development of application security controls.
e. Include a commitment to satisfy applicable requirements and continual improvement.
f. Cover all relevant applications regardless of whether they are developed in-house or via one’s supply chain.
g. Promote the use of an established software development lifecycle (SDLC) in software development, including code review, secure coding training, testing (functional, regression, security, etc.), vulnerability testing, and change management.
h. Ensure vulnerability processes are followed with regular patching, scanning, and remediation before production deployment.
i. Be reviewed by management periodically or after significant changes.
Control implemented
Control ownership
Description

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for application security to provide guidance to the appropriate planning, delivery and support of the organization's application security capabilities. Review and update the policies and procedures at least annually.