SAMMY UI is optimized for resolutions with a width 1024px and higher.
Identity Inventory
IAM-03: Is system identity information and levels of access managed, stored, and reviewed?
Organizations should maintain a database of all system identities having access to different cloud environments and assets. The database should illustrate a correlation between digital identities, assets where the access is provisioned, and the type of access being provisioned (i.e., business users, system users, privilege users, etc.). In addition, the database should be regularly reviewed to ensure access is revoked or changed based on job role changes.

The identity and access management database should incorporate single sign-on and multi-factor authentication for user access.
Database access should be based on need-to-know and least-privilege principles and should follow best practices (such as role-based access control and segregation of duties). Finally, all access (especially privileged access) should be logged and monitored for anomalies and unauthorized use and linked to alerting systems as appropriate.
Control implemented
Control ownership
Description

Manage, store, and review the information of system identities, and level of access.