SAMMY UI is optimized for resolutions with a width 1024px and higher.
Maturity Level 1
Maturity Level 2
Maturity Level 3
Verify the effectiveness of security components
V-AA-A-3: Do you regularly review the effectiveness of the security controls?
  • You evaluate the preventive, detective, and response capabilities of security controls
  • You evaluate the strategy alignment, appropriate support, and scalability of security controls
  • You evaluate the effectiveness at least yearly
  • You log identified shortcomings as defects
Coverage
- None: There is no coverage for this activity or not all quality criteria have been fulfilled.
- Some: You perform this activity across some portion of your applications, to a certain extend, or review it on an ad-hoc basis, while making sure that all quality criteria are fulfilled.
- Half: You perform this activity across half of your applications, to a larger extent or review it at regular times (though not very often), while making sure that all quality criteria are fulfilled.
- Most/All: You perform this activity across most / all of your applications, to a full extent or review it at regular times at most once a year, while making sure that all quality criteria are fulfilled.
Description

Review the effectiveness of the architecture components and their provided security mechanisms in terms of alignment with the overall strategy of the organization, and scrutinize the degree of availability, scalability and enterprise-readiness of the chosen security solutions. While tactical choices for a particular application can make sense in specific contexts, it is important to keep an eye on the bigger picture and ensure future readiness of the designed solution.

Feed any findings back into defect management to trigger further improvements to the architecture.

Recommended vendor for Architecture Validation
IcePanel logo

Visualize, verify, and review your architecture for security effectiveness with IcePanel. Collaborate with your team to design and evaluate system architecture at different levels of detail using the C4 model. Create interactive flows with tags to visualize data flows and identify vulnerable parts of your system. Save time from maintaining multiple diagrams, as changes are synced automatically from your model.

Why we like IcePanel: We love IcePanel because it offers an incredibly versatile and user-friendly solution for creating architecture diagrams using C4 model. It provides a systematic approach that not only supports the Architecture Mitigation practice, but also serves as an excellent tool for documenting and sharing architectures. With its context view, IcePanel delivers valuable input for threat modeling, making it an essential asset for any security-focused development team.

Click here to learn how IcePanel simplifies secure software architecture.

OWASP Team guidance

This is the official guidance provided by the OWASP SAMM Team.

Community guidance

This guidance is based on the approved community submissions.