SAMMY UI is optimized for resolutions with a width 1024px and higher.
Maturity Level 1
Maturity Level 2
Maturity Level 3
Use best-effort hardening
O-EM-A-1: Do you harden configurations for key components of your technology stacks?
  • You have identified the key components in each technology stack used
  • You have an established configuration standard for each key component
Coverage
Description

Benefit

Hardened basic configuration settings of your components

Activity

Understanding the importance of securing the technology stacks you're using, apply secure configuration to stack elements, based on readily available guidance (e.g., open source projects, vendor documentation, blog articles). When your teams develop configuration guidance for their applications, based on trial-and-error and information gathered by team members, encourage them to share their learnings across the organization.

Identify key elements of common technology stacks, and establish configuration standards for those, based on teams' experiences of what works.

At this level of maturity, you don't yet have a formal process for managing configuration baselines. Configurations may not be applied consistently across applications and deployments, and monitoring of conformance is likely absent.

Endorsed Solutions for Mastering Configuration Hardening
vendor logo Become a Recommended Vendor for Configuration Hardening!

Are you a provider of cutting-edge products, processes, consultancy, or technology that aligns with Configuration Hardening? Showcase your expertise and connect with organizations seeking solutions like yours. Apply now to become an endorsed vendor and help others achieve mastery!

Do you want to recommend a vendor to appear here? Recommend a vendor
OWASP Team guidance

This is the official guidance provided by the OWASP SAMM Team.

Community guidance

This guidance is based on the approved community submissions.