SAMMY works best on screens 1024px wide or larger.
LOG-10: Are monitoring and internal reporting capabilities established to report on cryptographic operations, encryption, and key management policies, processes, procedures, and controls?

Compliance breaches and deviations from standard operations should be reported as defined in the organization’s incident management process (as outlined in SEF-01). In addition, file-integrity monitoring or change-detection software should be used to prevent changes in existing log data.


Description

Establish and maintain a monitoring and internal reporting capability over the operations of cryptographic, encryption and key management policies, processes, procedures, and controls.