A.5.i WT43 WT18 The security manual describes the necessary procedures for recovering from a breach of security, including such breaches as:
  • compromised private keys for root or intermediate certificates
  • theft of private data provided by subscribers