History
- Priority
- should
- 2010
- Key generation, distribution and rekeying procedures should be documented in a SSP for the wireless network.
- 2008
- Key generation, distribution and re-keying procedures should be documented in a system security plan for the wireless network.