||Strong Encryption Algorithms and Keys: Service Providers, Network Operators, and Equipment Suppliers should use industry-accepted algorithms and key lengths for all uses of encryption, such as 3DES or AES.
||Cable; Internet/Data; Satellite; Wireless; Wireline
||Service Provider; Network Operator; Equipment Supplier
||Cyber Security;Encryption;Information Protection;
||http://www.atis.org/ - ATIS-0300276.2008 Operations, Administration, Maintenance, and Provisioning Security Requirements for the Public Telecommunications Network: A Baseline of Security Requirements for the Management Plane: March 2008.