This should document things such as - Bootstrapping - Key thresholds - How many keys we have of each type - Key validity (expiry time) - Implications for key compromise - Who holds keys, and how should they store them.