SAMMY UI is optimized for resolutions with a width 1024px and higher.
Safeguard Logs Integrity
IAM-12: Are processes, procedures, and technical measures to ensure the logging infrastructure is "read-only" for all with write access (including privileged access roles) defined, implemented, and evaluated?
The organization should consider the following for the control's implementation:
a. Logs should be stored in a centralized log management solution with separation of duties maintained by an independent team if possible.
b. Logs should be integrated with a SIEM-type solution for real-time monitoring to raise alerts in case of any violation.
Control implemented
Control ownership
Description

Define, implement and evaluate processes, procedures and technical measures to ensure the logging infrastructure is read-only for all with write access, including privileged access roles, and that the ability to disable it is controlled through a procedure that ensures the segregation of duties and break glass procedures.

Safeguard Logs Integrity
IAM-12: Is the ability to disable the "read-only" configuration of logging infrastructure controlled through a procedure that ensures the segregation of duties and break glass procedures?
The organization should consider the following for the control's implementation:
a. Logs should be stored in a centralized log management solution with separation of duties maintained by an independent team if possible.
b. Logs should be integrated with a SIEM-type solution for real-time monitoring to raise alerts in case of any violation.
Control implemented
Control ownership
Description

Define, implement and evaluate processes, procedures and technical measures to ensure the logging infrastructure is read-only for all with write access, including privileged access roles, and that the ability to disable it is controlled through a procedure that ensures the segregation of duties and break glass procedures.