An inventory of key systems should be conducted at least: