diff --git a/website/content/docs/enterprise/hsm/behavior.mdx b/website/content/docs/enterprise/hsm/behavior.mdx index f7496413c..a512a4de3 100644 --- a/website/content/docs/enterprise/hsm/behavior.mdx +++ b/website/content/docs/enterprise/hsm/behavior.mdx @@ -46,7 +46,7 @@ encryption key are supported when using an HSM. ## Performance and availability -When an HSM is used for generating various CSPs or for entropy augmentation, +When an HSM is used for generating various Critical Security Parameters (CSPs) or for entropy augmentation, interaction with the HSM becomes part of the request processing for functionality using it. This means the HSM must be online and available for those requests to succeed. Additionally, some operations are performed much