Mechanisms exist to enforce cryptographic communications keys to prevent one key from being used to access multiple devices.
Does the organization enforce cryptographic communications keys to prevent one key from being used to access multiple devices?