Home
Browse frameworks
Contact us
SAMMY premium
Login
SAMMY UI is optimized for resolutions with a width 1024px and higher.
DSOMM
Browse DSOMM
SAMM
OpenSAMM1.5
Cybersecurity Fundamentals
NIST CSF 2.0
NIST SSDF
NIST 800-34
DSOMM
BSIMM 14
ISO 27001:2022 CMMI
CIS Critical Security Controls
Build and Deployment
Build
Deployment
Patch Management
Culture and Organization
Design
Education and Guidance
Process
Implementation
Application Hardening
Development and Source Code Control
Infrastructure Hardening
Information Gathering
Logging
Monitoring
Test and Verification
Test KPI
Application Tests
Consolidation
Dynamic Depth For Applications
Dynamic Depth For Infrastructure
Static Depth for Applications
Static Depth for Infrastructure
Test Intensity
I-IH-1-1: MFA for admins
I-IH-1-2: Simple access control for systems
I-IH-1-3: Usage of edge encryption at transit
I-IH-2-1: Applications are running in virtualized environments
I-IH-2-2: Backup
I-IH-2-3: Baseline Hardening of the environment
I-IH-2-4: Isolated networks for virtual environments
I-IH-2-5: MFA
I-IH-2-6: Usage of an security account
I-IH-2-7: Usage of encryption at rest
I-IH-2-8: Usage of test and production environments
I-IH-2-9: Virtual environments are limited
I-IH-3-1: Filter outgoing traffic
I-IH-3-2: Immutable infrastructure
I-IH-3-3: Infrastructure as Code
I-IH-3-4: Limitation of system events
I-IH-3-5: Role based authentication and authorization
I-IH-3-6: Usage of internal encryption at transit
I-IH-3-7: Usage of security by default for components
I-IH-3-8: WAF baseline
I-IH-4-1: Hardening of the Environment
I-IH-4-2: Production near environments are used by developers
I-IH-4-3: Usage of a chaos monkey
I-IH-4-4: WAF medium
I-IH-5-1: Microservice-architecture
I-IH-5-2: WAF advanced
Virtual environments are limited
I-IH-2-9: Virtual environments are limited
All virtual environments are using resource limits on hard disks, memory and CPU
Not implemented
Partially implemented
Half implemented
Fully implemented