SAMMY UI is optimized for resolutions with a width 1024px and higher.
Maturity Level 1
Maturity Level 2
Maturity Level 3
Capture critical security information for deployment
820: Are security notes delivered with each software release?
  • Project teams document security-relevant configuration and operations information and provide documentation to users and operators.
  • Project teams document a list of security features built into the software, options for configuration, security impacts, and include a secure default.
  • Project stakeholders review security documentation prior to release.
  • Project teams update security documentation at least every six months.
Description

With software-specific knowledge, project teams should identify any security-relevant configuration and operations information and communicate it to users and operators. This enables the actual security posture of software at deployment sites to function in the same way that designers in the project team intended. This analysis should begin with architects and developers building a list of security features built-in to the software. From that list, information about configuration options and their security impact should be captured as well. For projects that offer several different deployment models, information about the security ramifications of each should be noted to better inform users and operators about the impact of their choices. Overall, the list should be lightweight and aim to capture the most critical information. Once initially created, it should be reviewed by the project team and business stakeholders for agreement. Additionally, it is effective to review this list with select operators or users in order to ensure the information is understandable and actionable. Project teams should review and update this information with every release, but must do so at least every six months.

Capture critical security information for deployment
820: Are security-related alerts and error conditions documented on a per-project basis?
  • Project teams document important security-related alerts and error conditions and provide the documentation to the operations team.
  • Project teams update alerts and error conditions documentation at least every six months.
  • Project teams document an automated or manual process for monitoring and responding to application alerts and errors.
  • Operations team regularly monitors and responds to application alerts and errors based on provided documentation.
Description

With software-specific knowledge, project teams should identify any security-relevant configuration and operations information and communicate it to users and operators. This enables the actual security posture of software at deployment sites to function in the same way that designers in the project team intended. This analysis should begin with architects and developers building a list of security features built-in to the software. From that list, information about configuration options and their security impact should be captured as well. For projects that offer several different deployment models, information about the security ramifications of each should be noted to better inform users and operators about the impact of their choices. Overall, the list should be lightweight and aim to capture the most critical information. Once initially created, it should be reviewed by the project team and business stakeholders for agreement. Additionally, it is effective to review this list with select operators or users in order to ensure the information is understandable and actionable. Project teams should review and update this information with every release, but must do so at least every six months.