SAMMY UI is optimized for resolutions with a width 1024px and higher.
Audit Logs Protection
LOG-02: Are processes, procedures, and technical measures defined, implemented, and evaluated to ensure audit log security and retention?
Log protection methodology should be applied in adherence to any applicable legal, statutory or regulatory compliance obligations. In the absence of those requirements, they should adhere to any standards established as appropriate for the business.
Control implemented
Control ownership
Description

Define, implement and evaluate processes, procedures and technical measures to ensure the security and retention of audit logs.