Home
Browse frameworks
Contact us
SAMMY premium
Login
SAMMY UI is optimized for resolutions with a width 1024px and higher.
DSOMM
Browse DSOMM
SAMM
OpenSAMM1.5
Cybersecurity Fundamentals
NIST CSF 2.0
NIST SSDF
NIST 800-34
DSOMM
BSIMM 14
ISO 27001:2022 CMMI
CIS Critical Security Controls
Build and Deployment
Build
Deployment
Patch Management
Culture and Organization
Design
Education and Guidance
Process
Implementation
Application Hardening
Development and Source Code Control
Infrastructure Hardening
Information Gathering
Logging
Monitoring
Test and Verification
Test KPI
Application Tests
Consolidation
Dynamic Depth For Applications
Dynamic Depth For Infrastructure
Static Depth for Applications
Static Depth for Infrastructure
Test Intensity
T-CO-1-1: Fix based on severity
T-CO-1-2: Simple false positive treatment
T-CO-1-3: Treatment of defects with severity high or higher
T-CO-2-1: Simple visualization of defects
T-CO-3-1: Fix based on accessibility
T-CO-3-2: Integration in development process
T-CO-3-3: Integration of vulnerability issues into the development process
T-CO-3-4: Treatment of defects with severity middle
T-CO-3-5: Usage of a vulnerability management system
T-CO-3-6: Treatment of defects per protection requirement
T-CO-4-1: Advanced visualization of defects
T-CO-4-2: Reproducible defect tickets
T-CO-5-1: Treatment of all defects
Fix based on severity
T-CO-1-1: Fix based on severity
Implement a very simple risk-based prioritization framework for vulnerability remediation based on the severity of the findings. On level one, fix only critical findings.
Not implemented
Partially implemented
Half implemented
Fully implemented