SAMMY UI is optimized for resolutions with a width 1024px and higher.
Security Monitoring and Alerting
LOG-03: Are security-related events identified and monitored within applications and the underlying infrastructure?
Implementation of application security monitoring should include the following components:
a. Generation of alerts from metrics indicating risks beyond established thresholds.
b. Categorization of risks based on business impact analysis and prioritized monitoring of high-impact risks.
c. Consideration of automation capabilities (when applicable) to streamline application security monitoring.
d. Reporting and/or dashboard to provide real-time visibility to security and business stakeholders on application security statuses.
e. Periodic review of monitoring capabilities and processes by a combined group of security, IT and, business stakeholders.
Control implemented
Control ownership
Description

Identify and monitor security-related events within applications and the underlying infrastructure. Define and implement a system to generate alerts to responsible stakeholders based on such events and corresponding metrics.

Security Monitoring and Alerting
LOG-03: Is a system defined and implemented to generate alerts to responsible stakeholders based on security events and their corresponding metrics?
Implementation of application security monitoring should include the following components:
a. Generation of alerts from metrics indicating risks beyond established thresholds.
b. Categorization of risks based on business impact analysis and prioritized monitoring of high-impact risks.
c. Consideration of automation capabilities (when applicable) to streamline application security monitoring.
d. Reporting and/or dashboard to provide real-time visibility to security and business stakeholders on application security statuses.
e. Periodic review of monitoring capabilities and processes by a combined group of security, IT and, business stakeholders.
Control implemented
Control ownership
Description

Identify and monitor security-related events within applications and the underlying infrastructure. Define and implement a system to generate alerts to responsible stakeholders based on such events and corresponding metrics.