Identify whether manual clear-text cryptographic key management operations are used.
If manual clear-text cryptographic key management operations are used:
i. Identify the document that defines procedures requiring:
o Split knowledge of keys
o Dual control of keys
ii. Describe how the following procedures were observed to be implemented for manual clear-text cryptographic key operations:
o Split knowledge of keys
o Dual control of keys