SAMMY UI is optimized for resolutions with a width 1024px and higher.
DE.CM-01.1
DE.CM-01.1: Firewalls shall be installed and operated at the network boundaries, including endpoint firewalls.

Firewalls shall be installed and operated at the network boundaries, including endpoint firewalls.

Documentation Maturity
Implementation Maturity
Description

Firewalls shall be installed and operated at the network boundaries, including endpoint firewalls.

DE.CM-01.2
DE.CM-01.2: Anti-virus, -spyware, and other -malware programs shall be installed and updated.

Anti-virus, -spyware, and other -malware programs shall be installed and updated.

Documentation Maturity
Implementation Maturity
Description

Anti-virus, -spyware, and other -malware programs shall be installed and updated.

DE.CM-01.3
DE.CM-01.3: The organisation shall monitor and identify unauthorised use of its business-critical systems through the detection of unauthorised local connections, network connections and remote connections.

The organisation shall monitor and identify unauthorised use of its business-critical systems through the detection of unauthorised local connections, network connections and remote connections.

Documentation Maturity
Implementation Maturity
Description

The organisation shall monitor and identify unauthorised use of its business-critical systems through the detection of unauthorised local connections, network connections and remote connections.

DE.CM-01.4
DE.CM-01.4: The organisation shall continuously monitor its network to spot signs of cyber threats or unusual activity, using clearly defined rules for what counts as a potential security incident.

The organisation shall continuously monitor its network to spot signs of cyber threats or unusual activity, using clearly defined rules for what counts as a potential security incident.

Documentation Maturity
Implementation Maturity
Description

The organisation shall continuously monitor its network to spot signs of cyber threats or unusual activity, using clearly defined rules for what counts as a potential security incident.