SAMMY UI is optimized for resolutions with a width 1024px and higher.
Audit Logs Monitoring and Response
LOG-05: Are security audit logs monitored to detect activity outside of typical or expected patterns?
Failure response capabilities should be in place. Also, consider infrastructure layers (e.g., network, container orchestration, hypervisor, endpoint, control plane, and data plane).

Monitor failures and alerts should they occur.
Control implemented
Control ownership
Description

Monitor security audit logs to detect activity outside of typical or expected patterns. Establish and follow a defined process to review and take appropriate and timely actions on detected anomalies.

Audit Logs Monitoring and Response
LOG-05: Is a process established and followed to review and take appropriate and timely actions on detected anomalies?
Failure response capabilities should be in place. Also, consider infrastructure layers (e.g., network, container orchestration, hypervisor, endpoint, control plane, and data plane).

Monitor failures and alerts should they occur.
Control implemented
Control ownership
Description

Monitor security audit logs to detect activity outside of typical or expected patterns. Establish and follow a defined process to review and take appropriate and timely actions on detected anomalies.