SAMMY UI is optimized for resolutions with a width 1024px and higher.
Threat and Vulnerability Management Policy and Procedures
TVM-01: Are policies and procedures established, documented, approved, communicated, applied, evaluated, and maintained to identify, report, and prioritize the remediation of vulnerabilities to protect systems against vulnerability exploitation?
A policy on threat and vulnerability management (TVM) should be established that includes the intent, purpose, and governance of how a CSP or CSC must address threats and vulnerabilities for their respective scope under the SSRM.

At a minimum, the policy should specify:
a. What should be covered under the scope, especially the need to comply with applicable laws, regulations, and contractual requirements.
b. The frequency of assessments.
c. The methods that should be used.
d. How and when assessments and significant vulnerabilities should be reported, including when it’s appropriate to share vulnerability information with customers and business partners.
e. How reports should be reviewed.
f. How actions to address relevant risks and opportunities should be tracked to closure.
g. Approval of CSP native and (where applicable) third-party data/asset protection capabilities and relevant services for use by appropriate CSC authorities.
h. A well-defined incident response process aligned with an organization's risk tolerance, accompanied by appropriate communication and notifications.
i. Acceptable periods of remediation of threats in order of severity and criticality of computing infrastructure.
j. Log review and correlation procedures with appropriate threat intelligence capabilities for log, events, metrics, and incidents (preferably through a centralized service).
Control implemented
Control ownership
Description

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures to identify, report and prioritize the remediation of vulnerabilities, in order to protect systems against vulnerability exploitation. Review and update the policies and procedures at least annually.

Threat and Vulnerability Management Policy and Procedures
TVM-01: Are threat and vulnerability management policies and procedures reviewed and updated at least annually?
A policy on threat and vulnerability management (TVM) should be established that includes the intent, purpose, and governance of how a CSP or CSC must address threats and vulnerabilities for their respective scope under the SSRM.

At a minimum, the policy should specify:
a. What should be covered under the scope, especially the need to comply with applicable laws, regulations, and contractual requirements.
b. The frequency of assessments.
c. The methods that should be used.
d. How and when assessments and significant vulnerabilities should be reported, including when it’s appropriate to share vulnerability information with customers and business partners.
e. How reports should be reviewed.
f. How actions to address relevant risks and opportunities should be tracked to closure.
g. Approval of CSP native and (where applicable) third-party data/asset protection capabilities and relevant services for use by appropriate CSC authorities.
h. A well-defined incident response process aligned with an organization's risk tolerance, accompanied by appropriate communication and notifications.
i. Acceptable periods of remediation of threats in order of severity and criticality of computing infrastructure.
j. Log review and correlation procedures with appropriate threat intelligence capabilities for log, events, metrics, and incidents (preferably through a centralized service).
Control implemented
Control ownership
Description

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures to identify, report and prioritize the remediation of vulnerabilities, in order to protect systems against vulnerability exploitation. Review and update the policies and procedures at least annually.