SAMMY UI is optimized for resolutions with a width 1024px and higher.
ID.RA-01.1
ID.RA-01.1: Threats and vulnerabilities shall be identified in all relevant assets, including software, network and system architectures, and facilities that house critical computing assets.

Threats and vulnerabilities shall be identified in all relevant assets, including software, network and system architectures, and facilities that house critical computing assets.

Documentation Maturity
Implementation Maturity
Description

Threats and vulnerabilities shall be identified in all relevant assets, including software, network and system architectures, and facilities that house critical computing assets.

ID.RA-01.2
ID.RA-01.2: A process shall be established to continuously monitor, identify, and document vulnerabilities of the organisation's business critical systems.

A process shall be established to continuously monitor, identify, and document vulnerabilities of the organisation's business critical systems.

Documentation Maturity
Implementation Maturity
Description

A process shall be established to continuously monitor, identify, and document vulnerabilities of the organisation's business critical systems.

ID.RA-01.3
ID.RA-01.3: The organisation shall establish and maintain a documented process that enables continuous review, analysis and remediation of vulnerabilities and makes information sharing possible, where applicable.

The organisation shall establish and maintain a documented process that enables continuous review, analysis and remediation of vulnerabilities and makes information sharing possible, where applicable.

Documentation Maturity
Implementation Maturity
Description

The organisation shall establish and maintain a documented process that enables continuous review, analysis and remediation of vulnerabilities and makes information sharing possible, where applicable.

ID.RA-01.4
ID.RA-01.4: To ensure that organisation's operations are not adversely affected by the testing process, performance/load testing and penetration testing on the organisation’s systems shall be carried out with care.

To ensure that organisation's operations are not adversely affected by the testing process, performance/load testing and penetration testing on the organisation’s systems shall be carried out with care.

Documentation Maturity
Implementation Maturity
Description

To ensure that organisation's operations are not adversely affected by the testing process, performance/load testing and penetration testing on the organisation’s systems shall be carried out with care.

ID.RA-01.5
ID.RA-01.5: Vulnerability scanning shall not adversely impact system functions.

Vulnerability scanning shall not adversely impact system functions.

Documentation Maturity
Implementation Maturity
Description

Vulnerability scanning shall not adversely impact system functions.

ID.RA-01.6
ID.RA-01.6: Vulnerabilities shall be identified and managed in all relevant assets, including software, network and system architectures, and facilities.

Vulnerabilities shall be identified and managed in all relevant assets, including software, network and system architectures, and facilities.

Documentation Maturity
Implementation Maturity
Description

Vulnerabilities shall be identified and managed in all relevant assets, including software, network and system architectures, and facilities.