SAMMY works best on screens 1024px wide or larger.
Least Privilege
IAM-05: Is the least privilege principle employed when implementing information system access?

User and service account access should leverage access control methods, such as role-based access control (RBAC) and attribute-based access control (ABAC). In addition, conduct regular reviews of access processes (including auditing, when appropriate) to identify non-adherence to the principle of least privilege.


Restrict privileged access and access to administrative accounts should be via the principle of least privilege and a need-to-know basis. Furthermore, access should be set to “deny all“ unless specifically allowed.


Description

Employ the least privilege principle when implementing information system access.