None
The software module applications and hardware security modules (HSMs) that are used to generate, establish, distribute, store, account for, suspend, revoke, or destroy cryptographic keys and metadata.
Source(s):
NIST SP 800-57 Part 2 Rev.1