5.6.1.2.8. The system shall be designed to be protected against unauthorized activation or operation of the RCP systems and interventions into the system. a0c0