Combinations to security containers changed by authorized persons as required
www.redbikepublishing.com Earlier articles addressed documenting the authorized persons having access to the combinations. Determining who needs access to the combination is one part of a successful formula. This article addresses when to and who does change the combinations. In this article continuing the coverage of the Defense Security Service (DSS) Self Inspection Handbook for NISP Contractors, we'll review the National Industrial Security Program Operating Manual (NISPOM) , Paragraph 5-308b-d. 5-309 Are combinations to security containers cha...