Automated mechanisms exist to utilize Hardware Security Modules (HSM) to protect authenticators on which the component relies.
Does the organization use automated mechanisms to utilize Hardware Security Modules (HSM) to protect authenticators on which the component relies?