Automated mechanisms exist to utilize Hardware Security Modules (HSM) to protect authenticators on which the component relies.