SAMMY UI is optimized for resolutions with a width 1024px and higher.
Tool Best Practices
PO.3.2: Follow recommended security practices to deploy, operate, and maintain tools and toolchains.
  • Example 1: Evaluate, select, and acquire tools, and assess the security of each tool.
  • Example 2: Integrate tools with other tools and existing software development processes and workflows.
  • Example 3: Use code-based configuration for toolchains (e.g., pipelines-as-code, toolchains-as-code).
  • Example 4: Implement the technologies and processes needed for reproducible builds.
  • Example 5: Update, upgrade, or replace tools as needed to address tool vulnerabilities or add new tool capabilities.
  • Example 6: Continuously monitor tools and tool logs for potential operational and security issues, including policy violations and anomalous behavior.
  • Example 7: Regularly verify the integrity and check the provenance of each tool to identify potential problems.
  • Example 8: See PW.6.1 and PW.6.2 regarding compiler, interpreter, and build tools and their hardening.
  • Example 9: See PO.5.1 and PO.5.2 regarding implementing and maintaining secure environments.
CMMI Maturity
Description

Follow recommended security practices to deploy, operate, and maintain tools and toolchains.