SAMMY UI is optimized for resolutions with a width 1024px and higher.
DE.CM-09.1
DE.CM-09.1: The organisation shall monitor computing hardware, software, runtime environments, and their data to detect potentially adverse events.

The organisation shall monitor computing hardware, software, runtime environments, and their data to detect potentially adverse events.

Documentation Maturity
Implementation Maturity
Description

The organisation shall monitor computing hardware, software, runtime environments, and their data to detect potentially adverse events.

DE.CM-09.2
DE.CM-09.2: The organisation shall implement hardware integrity checks to detect unauthorised tampering of critical system hardware. Controls shall be proportionate to the organisation’s risk profile and operational capacity.

The organisation shall implement hardware integrity checks to detect unauthorised tampering of critical system hardware. Controls shall be proportionate to the organisation’s risk profile and operational capacity.

Documentation Maturity
Implementation Maturity
Description

The organisation shall implement hardware integrity checks to detect unauthorised tampering of critical system hardware. Controls shall be proportionate to the organisation’s risk profile and operational capacity.

DE.CM-09.3
DE.CM-09.3: The organisation's incident response plan shall include measures to detect unauthorised tampering with the hardware of critical systems.

The organisation's incident response plan shall include measures to detect unauthorised tampering with the hardware of critical systems.

Documentation Maturity
Implementation Maturity
Description

The organisation's incident response plan shall include measures to detect unauthorised tampering with the hardware of critical systems.

DE.CM-09.4
DE.CM-09.4: The organisation shall establish a system to accurately distinguish between legitimate alerts and false positives, ensuring effective detection and removal of malicious code.

The organisation shall establish a system to accurately distinguish between legitimate alerts and false positives, ensuring effective detection and removal of malicious code.

Documentation Maturity
Implementation Maturity
Description

The organisation shall establish a system to accurately distinguish between legitimate alerts and false positives, ensuring effective detection and removal of malicious code.