SAMMY UI is optimized for resolutions with a width 1024px and higher.
Automated Secure Application Deployment
AIS-06: Are strategies and capabilities established and implemented to deploy application code in a secure, standardized, and compliant manner?
The strategies should include:
a. Defined security and automation requirements based on an organization's application deployment needs and standards.
b. Defined roles and responsibilities between security, application teams, and other stakeholder groups.
c. Identification and integration with existing application deployment processes.
d. Customization of secure application deployment for deployment types such as operating systems, network connections, configuration, etc.
e. Logging and monitoring of secure application deployment so that data issues can be promptly addressed by the appropriate people (incident or forensics).
f. Metrics to effectively measure deployment success.

The capabilities should be based on the organization's SSDLC and should include, for instance:
g. Defined and approved list of deployment and automation technologies.
h. Enablement for team members (e.g., developers, administrators, etc.) to dynamically address security issues when needed.

The strategies and capabilities should be reviewed periodically by senior management.
Control implemented
Control ownership
Description

Establish and implement strategies and capabilities for secure, standardized, and compliant application deployment. Automate where possible.

Automated Secure Application Deployment
AIS-06: Is the deployment and integration of application code automated where possible?
The strategies should include:
a. Defined security and automation requirements based on an organization's application deployment needs and standards.
b. Defined roles and responsibilities between security, application teams, and other stakeholder groups.
c. Identification and integration with existing application deployment processes.
d. Customization of secure application deployment for deployment types such as operating systems, network connections, configuration, etc.
e. Logging and monitoring of secure application deployment so that data issues can be promptly addressed by the appropriate people (incident or forensics).
f. Metrics to effectively measure deployment success.

The capabilities should be based on the organization's SSDLC and should include, for instance:
g. Defined and approved list of deployment and automation technologies.
h. Enablement for team members (e.g., developers, administrators, etc.) to dynamically address security issues when needed.

The strategies and capabilities should be reviewed periodically by senior management.
Control implemented
Control ownership
Description

Establish and implement strategies and capabilities for secure, standardized, and compliant application deployment. Automate where possible.