SAMMY UI is optimized for resolutions with a width 1024px and higher.
Encryption Monitoring and Reporting
LOG-10: Are monitoring and internal reporting capabilities established to report on cryptographic operations, encryption, and key management policies, processes, procedures, and controls?
Compliance breaches and deviations from standard operations should be reported as defined in the organization’s incident management process (as outlined in SEF-01). In addition, file-integrity monitoring or change-detection software should be used to prevent changes in existing log data.
Control implemented
Control ownership
Description

Establish and maintain a monitoring and internal reporting capability over the operations of cryptographic, encryption and key management policies, processes, procedures, and controls.