Mechanisms exist to ensure customers are provided with appropriate key management guidance whenever cryptographic keys are shared.
Does the organization ensure customers are provided with appropriate key management guidance whenever cryptographic keys are shared?