Codific
  • Solutions
    • AppSec Management with SAMMY
    • GRC Management with SAMMY
    • Ed-Tech and HR-Tech
      • Secure Video Sharing with Videolab
      • Student Attendance Tracking with Attendance Radar
      • Survey Analysis Automation with SARA
  • Services
    • OWASP SAMM Assessments
    • OWASP SAMM Training
    • OWASP SAMM Guidance
  • Company
    • Our Story
    • Who We Are
    • Codific @ OWASP Global AppSec Barcelona 2025
    • Codific @ OWASP
    • Careers
  • Partners
    • Implementation Partners Program
    • Recommended Vendors Program
      • Our Recommended Vendors
    • Academic Application Security Program
  • Customers
  • Insights
  • Contact
  • Go to SAMMY

OWASP

Home OWASP
Comparing NIST SSDF vs SAMM

28

Nov

Comparing NIST SSDF and OWASP SAMM: A Comprehensive Analysis

  • Aram Hovsepyan
  • Application Security, BSIMM, NIST SSDF, OWASP, SAMM

Over the past year, our SAMMY tool has grown significantly. It now supports not just […]

Read Article
Mastering OWASP SAMM

02

Nov

Common mistakes when implementing OWASP SAMM

  • Aram Hovsepyan
  • Application Security, OWASP, SAMM, Secure Software Development, SSDLC

OWASP Software Assurance Maturity Model (SAMM) is one of the only comprehensive frameworks available for[…]

Read Article
Mastering OWASP SAMM

20

Oct

Supplier Security Explained: Best Practices to Manage Supplier Risk

  • Aram Hovsepyan
  • Application Security, OWASP, SAMM, Secure Software Development, SSDLC

What is supplier risk management about? Outsourcing software development has become a cornerstone for many[…]

Read Article
Mastering OWASP SAMM

19

Oct

Software Security Requirements Explained: Why It Matters and How to Implement It Effectively

  • Aram Hovsepyan
  • Application Security, OWASP, SAMM, Secure Software Development, SSDLC

Introduction to software security requirements Despite clearly understanding the importance of security requirements, organizations seem[…]

Read Article
SAMM Benchmark average data across all business functions.

05

Oct

OWASP SAMM Benchmark Data Update

  • Aram Hovsepyan
  • Application Security, OWASP, SAMM

The OWASP Software Assurance Maturity Model (SAMM) is rapidly becoming the go-to framework for application[…]

Read Article
Bridging cybersecurity compliance standards

02

Oct

Mapping compliance standards: Harnessing SAMMY and OpenCRE

  • Aram Hovsepyan
  • Application Security, NIST SSDF, OWASP, SAMM, Secure Software Development, Software security

Cybersecurity in general and application security (AppSec) in particular are extremely challenging topics. They run[…]

Read Article
how to do SAMM assessments

10

May

How to do SAMM assessments: Everything you need to know

  • Michaella Masters
  • Application Security, OWASP, Privacy by Design, SAMM, Security

Want to get started with SAMM?  We have just the thing! Take the free OWASP[…]

Read Article
Communicating security

12

Apr

Reporting with OWASP SAMM

  • Dag Flachet
  • OWASP, SAMM, Security

How to use OWASP SAMM for effective communication on security? Reporting with OWASP SAMM is[…]

Read Article
NIST CSF vs OWASP SAMM

26

Sep

A comparison of NIST CSF 2.0 and OWASP SAMM

  • Aram Hovsepyan
  • NIST SSDF, OWASP, Security

NIST has finalized the Cybersecurity Framework (CSF) 2.0. CSF 2.0 focuses on understanding, assessing, prioritising,[…]

Read Article
Implementing SAMM - OWASP SAMM tool SAMMY workflow diagram

04

May

Manage your security posture with SAMMY.

  • Dag Flachet
  • Application Security, OWASP, Security
If you are building software the best way to manage your security posture is with[...]
Read Article

26

Apr

OWASP SAMM: Policy and Compliance

  • Nicolas Montauban
  • OWASP, Security

OWASP is the Open Worldwide Application Security Project. It is a non-profit foundation that works[…]

Read Article

23

Mar

OWASP SDLC: Building your SSDLC with OWASP SAMM

  • Nicolas Montauban
  • Application Security, OWASP, Security

In the dynamic digital realm, security is not a luxury, it is an imperative. As[…]

Read Article
Next

Building a simple and safe digital future

  • Visit Codific's LinkedIn channel (opens in a new tab)
  • Visit Codific's YouTube channel (opens in a new tab)

Main Focus

Application Security Compliance Cybersecurity NIST SSDF OWASP Privacy by Design SAMM Secure Software Development Security Security Software Engineer Software security SSDLC

Recent Post

  • Conceptual illustration of the SSDLC

    June 11, 2025

    What Is the SSDLC? A Guide to Secure Development

    June 11, 2025

  • dependency governance in SOOS

    June 03, 2025

    Master Dependency Management with SOOS and SAMM

    June 03, 2025

  • vulnerability management dashboard

    May 26, 2025

    Security metrics with purpose and strategic impact

    May 26, 2025

In the Spotlight

  • SAMMY
  • Secure Video Sharing with Videolab
  • Attendance Radar
  • SARA
  • Terms & Conditions
  • Imprint
  • Cookie Policy
  • Privacy Statement

Codific ® 2025. All rights reserved.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}