SAMMY UI is optimized for resolutions with a width 1024px and higher.
Secure Area Authorization
DCS-09: Are solely authorized personnel able to access secure areas, with all ingress and egress areas restricted, documented, and monitored by physical access control mechanisms?
Monitor, control, and isolate data storage and processing facilities, including ingress and egress points to service and delivery areas and other points where unauthorized personnel may enter the premises. Organizations should retain access logs for authorized personnel for no less than six (6) months. Facilities owners should adopt the ISO/IEC_27001_2013-A.11.1.2 standard. Record the dates and times of visitor entries and departures, and supervise all visitors unless their access has been previously approved. Visitors should only be granted access for specific, authorized purposes and issued with instructions on area security requirements and emergency procedures. Authenticate visitor identities by any appropriate means (i.e., validation with government-issued identification (ID), such as an official identity document, driver's license, passport, etc.).
Control implemented
Control ownership
Description

Allow only authorized personnel access to secure areas, with all ingress and egress points restricted, documented, and monitored by physical access control mechanisms. Retain access control records on a periodic basis as deemed appropriate by the organization.

Secure Area Authorization
DCS-09: Are access control records retained periodically, as deemed appropriate by the organization?
Monitor, control, and isolate data storage and processing facilities, including ingress and egress points to service and delivery areas and other points where unauthorized personnel may enter the premises. Organizations should retain access logs for authorized personnel for no less than six (6) months. Facilities owners should adopt the ISO/IEC_27001_2013-A.11.1.2 standard. Record the dates and times of visitor entries and departures, and supervise all visitors unless their access has been previously approved. Visitors should only be granted access for specific, authorized purposes and issued with instructions on area security requirements and emergency procedures. Authenticate visitor identities by any appropriate means (i.e., validation with government-issued identification (ID), such as an official identity document, driver's license, passport, etc.).
Control implemented
Control ownership
Description

Allow only authorized personnel access to secure areas, with all ingress and egress points restricted, documented, and monitored by physical access control mechanisms. Retain access control records on a periodic basis as deemed appropriate by the organization.