12.3.3 Verify that the usage policies require a list of all devices and personnel authorized to use the devices
[PCI DSS 1.x] 12.3.3 A list of all such devices and personnel with access
[READ-ONLY] Archives
[RETIRED] PCI DSS v.1.x Questions and Answers
Maintain an Information Security Policy