5.6.1.2.8. | The system shall be designed to be protected against unauthorized activation or operation of the RCP systems and interventions into the system. | a0c0 |
5.6.1.2.8. | The system shall be designed to be protected against unauthorized activation or operation of the RCP systems and interventions into the system. | a0c0 |