SAMMY UI is optimized for resolutions with a width 1024px and higher.
Encryption and Key Management Policy and Procedures
CEK-01: Are cryptography, encryption, and key management policies and procedures established, documented, approved, communicated, applied, evaluated, and maintained?
Policies and procedures on the use, protection, and lifetime of cryptographic keys should be developed and implemented through their full lifecycle.

Policies and procedures include but are not limited to the following considerations:

A. Policies and procedures relating to organization/management.
a. Roles and responsibilities (See GRM for general considerations)
b. Data protection (DSP domain for general considerations)
1) Data encryption
2) Algorithm
c. Change management (See CCC domain for general considerations)
1) Cost-Benefit analysis
d. Risk management (See BCR/GRC domains for general considerations)
e. Monitoring and reporting (see LOG and monitoring domain for general considerations )
f. Transaction/activity logging (see LOG and monitoring domain for general considerations)
g. Incident handling (see SEF domain for general considerations)
h. Audit (See A&A domain for general considerations)

B. Policies and procedures relating to key management.
a. Key generation
b. Key distribution
c. Key rotation
d. Key revocation
e. Key destruction
f. Key activation
g. Key suspension
h. Key deactivation
i. Key archival
j. Key compromise
k. Key recovery
l. Key inventory management
m. Key purposes
n. Key access
Control implemented
Control ownership
Description

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for Cryptography, Encryption and Key Management. Review and update the policies and procedures at least annually.

Encryption and Key Management Policy and Procedures
CEK-01: Are cryptography, encryption, and key management policies and procedures reviewed and updated at least annually?
Policies and procedures on the use, protection, and lifetime of cryptographic keys should be developed and implemented through their full lifecycle.

Policies and procedures include but are not limited to the following considerations:

A. Policies and procedures relating to organization/management.
a. Roles and responsibilities (See GRM for general considerations)
b. Data protection (DSP domain for general considerations)
1) Data encryption
2) Algorithm
c. Change management (See CCC domain for general considerations)
1) Cost-Benefit analysis
d. Risk management (See BCR/GRC domains for general considerations)
e. Monitoring and reporting (see LOG and monitoring domain for general considerations )
f. Transaction/activity logging (see LOG and monitoring domain for general considerations)
g. Incident handling (see SEF domain for general considerations)
h. Audit (See A&A domain for general considerations)

B. Policies and procedures relating to key management.
a. Key generation
b. Key distribution
c. Key rotation
d. Key revocation
e. Key destruction
f. Key activation
g. Key suspension
h. Key deactivation
i. Key archival
j. Key compromise
k. Key recovery
l. Key inventory management
m. Key purposes
n. Key access
Control implemented
Control ownership
Description

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for Cryptography, Encryption and Key Management. Review and update the policies and procedures at least annually.