SAMMY UI is optimized for resolutions with a width 1024px and higher.
Encryption Change Management
CEK-05: Are standard change management procedures established to review, approve, implement and communicate cryptography, encryption, and key management technology changes that accommodate internal and external sources?
Key change management is the process of managing all changes to key management governance, organization, infrastructure, and activities.
a. Changes to the key management system and its policies and procedures should be analyzed and approved before implementation.
b. Changes should be documented to show the reasoning behind the changes and include a path to rollback to the previous status.
c. If unauthorized changes are made to the software, the software should be recovered.
d. There should be security audits after every significant change to the key management system.
e. All audit results should be reported to the system authority.
Control implemented
Control ownership
Description

Establish a standard change management procedure, to accommodate changes from internal and external sources, for review, approval, implementation and communication of cryptographic, encryption and key management technology changes.