The software module applications and hardware security modules (HSMs) that are used to generate, establish, distribute, store, account for, suspend, revoke, or destroy cryptographic keys and metadata.
Sources:
NIST SP 800-57 Part 2 Rev.1