A.5.d WT43 The security manual describes how individuals are authorized to change each of the following:
  • safe combinations
  • cipher lock combinations
  • computer access passwords
  • hardware encryption keys
  • configuration-control logs and records (see §A.1.k)