Agencies should conduct inventory using two personnel that have undergone communicationssecurity custodial training and have been appointed as COMSEC custodians.
2015
Agencies should conduct inventory using two personnel that have undergone communicationssecurity custodial training and have been appointed as COMSEC custodians.
2010
It is recommended agencies conduct audits using two personnel with cryptographic systemadministrator access.