The set of hardware, software, and/or firmware that implements approved cryptographic functions (including key generation) that are contained within the cryptographic boundary of the module.
Sources:
FIPS 203
A cryptographic module whose keys and/or metadata have been subjected to unauthorized access, modification, or disclosure while contained within the cryptographic module.
Sources:
NIST SP 800-152
under Cryptographic module (compromised)
A set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation).
Sources:
NIST SP 800-63-3
under Cryptographic Module
The set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation) and is contained within the cryptographic boundary.
Sources:
NIST SP 800-53 Rev. 5
from
FIPS 140-3