SAMMY UI is optimized for resolutions with a width 1024px and higher.
Off-Site Transfer Authorization Policy and Procedures
DCS-02: Are policies and procedures for the relocation or transfer of hardware, software, or data/information to an offsite or alternate location established, documented, approved, communicated, implemented, enforced, maintained?
The communications between services that facilitate movements of workloads, application data, etc., should be encrypted based on globally recognized crypto algorithms such as AES-256. Additionally, communication may include measures such as obfuscation or de-identification to render the information in transit illegible. NIST 800-122 (Guide to Protecting the Confidentiality of Personally Identifiable Information - PII) provides relevant and effective techniques for obscuring sensitive data, such as personally identifiable information (PII), etc.
Control implemented
Control ownership
Description

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for the relocation or transfer of hardware, software, or data/information to an offsite or alternate location. The relocation or transfer request requires the written or cryptographically verifiable authorization. Review and update the policies and procedures at least annually.

Off-Site Transfer Authorization Policy and Procedures
DCS-02: Does a relocation or transfer request require written or cryptographically verifiable authorization?
The communications between services that facilitate movements of workloads, application data, etc., should be encrypted based on globally recognized crypto algorithms such as AES-256. Additionally, communication may include measures such as obfuscation or de-identification to render the information in transit illegible. NIST 800-122 (Guide to Protecting the Confidentiality of Personally Identifiable Information - PII) provides relevant and effective techniques for obscuring sensitive data, such as personally identifiable information (PII), etc.
Control implemented
Control ownership
Description

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for the relocation or transfer of hardware, software, or data/information to an offsite or alternate location. The relocation or transfer request requires the written or cryptographically verifiable authorization. Review and update the policies and procedures at least annually.

Off-Site Transfer Authorization Policy and Procedures
DCS-02: Are policies and procedures for the relocation or transfer of hardware, software, or data/information to an offsite or alternate location reviewed and updated at least annually?
The communications between services that facilitate movements of workloads, application data, etc., should be encrypted based on globally recognized crypto algorithms such as AES-256. Additionally, communication may include measures such as obfuscation or de-identification to render the information in transit illegible. NIST 800-122 (Guide to Protecting the Confidentiality of Personally Identifiable Information - PII) provides relevant and effective techniques for obscuring sensitive data, such as personally identifiable information (PII), etc.
Control implemented
Control ownership
Description

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for the relocation or transfer of hardware, software, or data/information to an offsite or alternate location. The relocation or transfer request requires the written or cryptographically verifiable authorization. Review and update the policies and procedures at least annually.