A Chief Information Officer (CIO) is concerned that encryption keys might be exfiltrated by a contractor. The CIO wants to keep control over key visibility and management.
Which of the following would be the BEST solution for the CIO to implement?”
A . HSM
B . CA
C . SSH
D . SSL
Answer: A