SAMMY UI is optimized for resolutions with a width 1024px and higher.
Transaction/Activity Logging
LOG-11: Are key lifecycle management events logged and monitored to enable auditing and reporting on cryptographic keys' usage?
Logging of key lifecycle events should include but are not limited to the following events: key generation, key usage, key storage (including backup), and archiving and key deletion. In addition, only authorized personnel should have access to key materials, and all access attempts should be logged and reviewed.

Document and implement all key-management processes and procedures for cryptographic keys, including:
a. Generation of strong cryptographic keys
b. Secure cryptographic key distribution
c. Secure cryptographic key storage
d. Key revocation after expiry
e. Split knowledge and dual control as needed for manual key management operations
f. Prevention of unauthorized substitution of cryptographic keys
Control implemented
Control ownership
Description

Log and monitor key lifecycle management events to enable auditing and reporting on usage of cryptographic keys.