SAMMY works best on screens 1024px wide or larger.
DE.CM-09.1
DE.CM-09.1: The organisation shall monitor computing hardware, software, runtime environments, and their data to detect potentially adverse events.

The organisation shall monitor computing hardware, software, runtime environments, and their data to detect potentially adverse events.

Description

The organisation shall monitor computing hardware, software, runtime environments, and their data to detect potentially adverse events.

DE.CM-09.2
DE.CM-09.2: The organisation shall implement hardware integrity checks to detect unauthorised tampering of critical system hardware. Controls shall be proportionate to the organisation’s risk profile and operational capacity.

The organisation shall implement hardware integrity checks to detect unauthorised tampering of critical system hardware. Controls shall be proportionate to the organisation’s risk profile and operational capacity.

Description

The organisation shall implement hardware integrity checks to detect unauthorised tampering of critical system hardware. Controls shall be proportionate to the organisation’s risk profile and operational capacity.

DE.CM-09.3
DE.CM-09.3: The organisation's incident response plan shall include measures to detect unauthorised tampering with the hardware of critical systems.

The organisation's incident response plan shall include measures to detect unauthorised tampering with the hardware of critical systems.

Description

The organisation's incident response plan shall include measures to detect unauthorised tampering with the hardware of critical systems.

DE.CM-09.4
DE.CM-09.4: The organisation shall establish a system to accurately distinguish between legitimate alerts and false positives, ensuring effective detection and removal of malicious code.

The organisation shall establish a system to accurately distinguish between legitimate alerts and false positives, ensuring effective detection and removal of malicious code.

Description

The organisation shall establish a system to accurately distinguish between legitimate alerts and false positives, ensuring effective detection and removal of malicious code.