The correct answer is In a hardware security module (HSM). A Hardware Security Module (HSM) is specifically designed for secure key management and cryptographic operations. HSMs provide physical and logical protection for cryptographic keys, tamper evidence/resistance, and often FIPS 140-2 certification.
Embedded in application code is incorrect because it's highly insecure as it exposes keys to anyone with access to the code.
In an encrypted database is incorrect because while this can be relatively secure, it depends on how the database encryption key is protected, creating potential circular dependencies.
Using a key escrow system is incorrect because key escrow systems focus on key recovery rather than secure storage and introduce additional security considerations regarding the escrow agent.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Hardware Security Module (HSM)?
Open an interactive chat with Bash
What does FIPS 140-2 certification entail?
Open an interactive chat with Bash
Why is embedding keys in application code considered insecure?
Open an interactive chat with Bash
ISC2 CISSP
Security Architecture and Engineering
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access