SAMMY UI is optimized for resolutions with a width 1024px and higher.
Maturity Level 1
Maturity Level 2
Maturity Level 3
Maturity Level 4
Maturity Level 5
Simple application metrics
G-MO-1-1: Simple application metrics
  • Gathering of application metrics helps to identify incidents like brute force attacks, login/logout.
Description

Gathering of application metrics helps to identify incidents like brute force attacks, login/logout patterns, and unusual spikes in activity. Key metrics to monitor include: - Authentication attempts (successful/failed logins) - Transaction volumes and patterns (e.g. orders, payments) - API call rates and response times - User session metrics - Resource utilization Example: An e-commerce application normally processes 100 orders per hour. A sudden spike to 1000 orders per hour could indicate either: - A legitimate event (unannounced marketing campaign, viral social media post) - A security incident (automated bulk purchase bots, credential stuffing attack) By monitoring these basic metrics, teams can quickly investigate abnormal patterns and determine if they represent security incidents requiring response.

Risk:Attacks on an application are not recognized.

Simple budget metrics
G-MO-1-2: Simple budget metrics
  • Cloud providers often provide insight into budgets. A threshold and alarming for the budget is set.
Description

Cloud providers often provide insight into budgets. A threshold and alarming for the budget is set.

Risk:Not getting notified about reaching the end of the budget (e.g. due to a denial of service) creates unexpected costs.

Simple system metrics
G-MO-1-3: Simple system metrics
  • Gathering of system metrics helps to identify incidents and specially bottlenecks like in CPU usage, memory usage and hard disk usage.
Description

Gathering of system metrics helps to identify incidents and specially bottlenecks like in CPU usage, memory usage and hard disk usage.

Risk:Without simple metrics analysis of incidents are hard. In case an application uses a lot of CPU from time to time, it is hard for a developer to find out the source with Linux commands.