SAMMY UI is optimized for resolutions with a width 1024px and higher.
Maturity Level 1
Maturity Level 2
Maturity Level 3
Assess application architecture
V-AA-A-1: Do you review the application architecture for key security objectives on an ad-hoc basis?
  • You have an agreed upon model of the overall software architecture
  • You include components, interfaces, and integrations in the architecture model
  • You verify the correct provision of general security mechanisms
  • You log missing security controls as defects
Coverage criteria
Description

Benefit

Understanding of high-level architecture and sensible security measures

Activity

Create a view of the overall architecture and examine it for the correct provision of general security mechanisms such as authentication, authorization, user and rights management, secure communication, data protection, key management and log management. Also consider the support for privacy. Do this based on project artifacts such as architecture or design documents, or interviews with business owners and technical staff. Also consider the infrastructure components - these are all the systems, components and libraries (including SDKs) that are not specific to the application, but provide direct support to use or manage the application(s) in the organisation.

Note any security-related functionality in the architecture and review its correct provision. Do this in an ad-hoc manner, from the point of view of anonymous users, authorized users, and specific application roles.