SAMMY UI is optimized for resolutions with a width 1024px and higher.
Least Privilege
IAM-05: Is the least privilege principle employed when implementing information system access?
User and service account access should leverage access control methods, such as role-based access control (RBAC) and attribute-based access control (ABAC). In addition, conduct regular reviews of access processes (including auditing, when appropriate) to identify non-adherence to the principle of least privilege.

Restrict privileged access and access to administrative accounts should be via the principle of least privilege and a need-to-know basis. Furthermore, access should be set to “deny all“ unless specifically allowed.
Control implemented
Control ownership
Description

Employ the least privilege principle when implementing information system access.