1.1.5

1.1.5  ::  Documentation and business justification for use of all services, protocols, and ports allowed, including documentation of security features implemented for those protocols considered to be insecure

This is where using a WIKI will be very helpful to keep track of what has been allocated on the network.