Watch this video on YouTube
As the security manager in charge of cryptographic key management, which principle should dictate the security measures for these keys?