The software module applications and hardware security modules (HSMs) that are used to generate, establish, distribute, store, account for, suspend, revoke, or destroy cryptographic keys and metadata.
						                            Source(s):
						                            
								                            
                                                                    NIST SP 800-57 Part 2 Rev.1