SAMMY UI is optimized for resolutions with a width 1024px and higher.
Application Vulnerability Remediation
AIS-07: Are application security vulnerabilities remediated following defined processes?
Application security remediation should adhere to the following guidelines:
a. Follow defined remediation processes, designed, tested, and implemented by security and application teams.
b. Remediate risks as early in the SDLC as possible, such as during the design or development stages.
c. Have defined roles and responsibilities, including escalation paths for application security incident response and remediation.
d. Follow a risk-based approach to address high-risk incidents that significantly impact application availability, integrity, or confidentiality.
e. Leverage automation when possible to increase remediation efficiency and accuracy.

Processes, roles, responsibilities, and documentation established for application security remediation should be reviewed periodically by management.

Example:
• GitOps-based remediation of application vulnerabilities.
• Automated remediation efficacy metric: total number of remediations of active critical/high vulnerabilities performed through Git for the given period.
• Total number of active critical/ high vulnerabilities identified for the given period.
Control implemented
Control ownership
Description

Define and implement a process to remediate application security vulnerabilities, automating remediation when possible.

Application Vulnerability Remediation
AIS-07: Is the remediation of application security vulnerabilities automated when possible?
Application security remediation should adhere to the following guidelines:
a. Follow defined remediation processes, designed, tested, and implemented by security and application teams.
b. Remediate risks as early in the SDLC as possible, such as during the design or development stages.
c. Have defined roles and responsibilities, including escalation paths for application security incident response and remediation.
d. Follow a risk-based approach to address high-risk incidents that significantly impact application availability, integrity, or confidentiality.
e. Leverage automation when possible to increase remediation efficiency and accuracy.

Processes, roles, responsibilities, and documentation established for application security remediation should be reviewed periodically by management.

Example:
• GitOps-based remediation of application vulnerabilities.
• Automated remediation efficacy metric: total number of remediations of active critical/high vulnerabilities performed through Git for the given period.
• Total number of active critical/ high vulnerabilities identified for the given period.
Control implemented
Control ownership
Description

Define and implement a process to remediate application security vulnerabilities, automating remediation when possible.