DevSecOps-MaturityModel icon indicating copy to clipboard operation
DevSecOps-MaturityModel copied to clipboard

Unsupported SAMM controls

Open ioggstream opened this issue 3 years ago • 0 comments

The following SAMMs are not used in dsomm

|     3 | O-OM-2-B | Operations   | Operational Management      | 2        | System Decomissioning / Legacy Management |
|     7 | G-PC-2-A | Governance   | Policy & Compliance         | 2        | Policy & Standards                        |
|    11 | O-OM-1-B | Operations   | Operational Management      | 1        | System Decomissioning / Legacy Management |
|    14 | G-PC-1-B | Governance   | Policy & Compliance         | 1        | Compliance Management                     |
|    21 | V-AA-2-B | Verification | Architecture Assessment     | 2        | Architecture Mitigation                   |
|    27 | V-RT-3-B | Verification | Requirements-driven Testing | 3        | Misuse/Abuse Testing                      |
|    31 | G-PC-3-A | Governance   | Policy & Compliance         | 3        | Policy & Standards                        |
|    34 | V-RT-1-B | Verification | Requirements-driven Testing | 1        | Misuse/Abuse Testing                      |
|    37 | O-OM-3-A | Operations   | Operational Management      | 3        | Data Protection                           |
|    41 | V-RT-3-A | Verification | Requirements-driven Testing | 3        | Control Verification                      |
|    42 | V-RT-1-A | Verification | Requirements-driven Testing | 1        | Control Verification                      |
|    45 | V-AA-1-A | Verification | Architecture Assessment     | 1        | Architecture Validation                   |
|    48 | V-AA-3-A | Verification | Architecture Assessment     | 3        | Architecture Validation                   |
|    55 | V-RT-2-A | Verification | Requirements-driven Testing | 2        | Control Verification                      |
|    56 | V-RT-2-B | Verification | Requirements-driven Testing | 2        | Misuse/Abuse Testing                      |
|    57 | V-AA-3-B | Verification | Architecture Assessment     | 3        | Architecture Mitigation                   |
|    62 | V-AA-2-A | Verification | Architecture Assessment     | 2        | Architecture Validation                   |
|    73 | G-PC-3-B | Governance   | Policy & Compliance         | 3        | Compliance Management                     |
|    74 | G-PC-2-B | Governance   | Policy & Compliance         | 2        | Compliance Management                     |
|    75 | O-OM-2-A | Operations   | Operational Management      | 2        | Data Protection                           |
|    78 | V-AA-1-B | Verification | Architecture Assessment     | 1        | Architecture Mitigation                   |
|    80 | G-PC-1-A | Governance   | Policy & Compliance         | 1        | Policy & Standards                        |
|    81 | O-OM-1-A | Operations   | Operational Management      | 1        | Data Protection                           |
|    88 | O-OM-3-B | Operations   | Operational Management      | 3        | System Decomissioning / Legacy Management |

the query is

select * from samm where id not in (SELECT DISTINCT s.id   FROM     activity as a,     samm as s   WHERE  a.references like concat('%', substring(s.id, 3,2), '%') ) order by 1 ;

ioggstream avatar May 10 '21 22:05 ioggstream