Home
Browse frameworks
Contact us
SAMMY premium
Login
SAMMY UI is optimized for resolutions with a width 1024px and higher.
DSOMM
Browse DSOMM
SAMM
OpenSAMM1.5
ISO 27001 (Deprecated)
Cybersecurity Fundamentals
NIST CSF 2.0
NIST SSDF
NIST 800-34
DSOMM
BSIMM 14
Build and Deployment
Build
Deployment
Patch Management
Culture and Organization
Design
Education and Guidance
Process
Implementation
Application Hardening
Development and Source Code Control
Infrastructure Hardening
Information Gathering
Logging
Monitoring
Test and Verification
Test KPI
Application Tests
Consolidation
Dynamic Depth For Applications
Dynamic Depth For Infrastructure
Static Depth for Applications
Static Depth for Infrastructure
Test Intensity
T-DI-2-1: Test for exposed services
T-DI-2-2: Test network segmentation
T-DI-2-3: Test of the configuration of cloud environments
T-DI-3-1: Test for unauthorized installation
T-DI-3-2: Weak password test
T-DI-4-1: Load tests
T-DI-5-1: Tests for unused resources
Test for exposed services
T-DI-2-1: Test for exposed services
With the help of tools the network configuration of unintentional exposed cluster(s) are tested. To identify clusters, all subdomains might need to be identified with a tool like OWASP Amass to perform port scans based o the result.
Not implemented
Partially implemented
Half implemented
Fully implemented