... network security and firewall management, including port restrictions and IP address filtering; 4. user management, separate trusted-role assignments, education, awareness, and training; and 5. logical ... Cryptographic device lifecycle management events. 2. CA and Subscriber Certificate lifecycle management events, including: a. Certificate requests, renewal, and re-key requests, and revocation; b. All ... hardware failures, and other anomalies; e. Firewall and router activities; and f. Entries to and exits from the CA facility. Log entries MUST include the following elements: 1. Date and time of...