ISM-0544

History

Priority
should
2010
Key generation, distribution and rekeying procedures should be documented in a SSP for the wireless network.
2008
Key generation, distribution and re-keying procedures should be documented in a system security plan for the wireless network.