Currently I'm the only one with the active keys (my wife has access to them if something happens to me). As we move into automated systems, we will segregate encrypted keys so that each level only needs the specific keys to perform it's functionality.
You are viewing a single comment's thread from: