SAMMY UI is optimized for resolutions with a width 1024px and higher.
Maturity Level 1
Maturity Level 2
Maturity Level 3
Identify application dependencies
I-SB-B-1: Do you have solid knowledge about dependencies you're relying on?
  • You have a current bill of materials (BOM) for every application
  • You can quickly find out which applications are affected by a particular CVE
  • You have analyzed, addressed, and documented findings from dependencies at least once in the last three months
Coverage
- None: There is no coverage for this activity or not all quality criteria have been fulfilled.
- Some: You perform this activity across some portion of your applications, to a certain extend, or review it on an ad-hoc basis, while making sure that all quality criteria are fulfilled.
- Half: You perform this activity across half of your applications, to a larger extent or review it at regular times (though not very often), while making sure that all quality criteria are fulfilled.
- Most/All: You perform this activity across most / all of your applications, to a full extent or review it at regular times at most once a year, while making sure that all quality criteria are fulfilled.
Description

Keep a record of all dependencies used throughout the target production environment. This is sometimes referred to as a Bill of Materials (BOM). Consider that different components of the application may consume entirely different dependencies. For example, if the software package is a web application, cover both the server-side application code and client-side scripts. In building these records, consider the various locations where dependencies might be specified such as configuration files, the project's directory on disk, a package management tool or the actual code (e.g. via an IDE that supports listing dependencies).

Gather the following information about each dependency:

  • Where it is used or referenced
  • Version used
  • License
  • Source information (link to repository, author's name, etc.)
  • Support and maintenance status of the dependency

Check the records to discover any dependencies with known vulnerabilities and update or replace them accordingly.

Recommended vendor for Software Dependencies
Soos logo

SOOS enables growing teams to make the best software security decisions and protect their business through clear, configurable, and affordable software vulnerability and license management. Easily scan code and running applications to meet modern compliance needs. Perfect for teams that are just getting started and more mature DevOps teams that need comprehensive integration capabilities powered by SOOS’s robust CLI.

Why we like Soos: We love Soos for their unique solution designed with the reality of enterprise environment in mind. Unlike many tools that require organizations to adjust their processes, Soos adapts to you, making it an ideal choice for enterprises looking to manage vulnerabilities effectively without sacrificing the way they work.

Find out how Soos can help you manage your supply chain risk.

OWASP Team guidance

This is the official guidance provided by the OWASP SAMM Team.

Community guidance

This guidance is based on the approved community submissions.