Planning Your Configuration
Before initializing your HSM, consider the following available features and options. Some would be inconvenient to change after your HSM is in service:
>Password-authenticated HSM Planning
>Multi-factor (PED-authenticated) HSM Planning
>Recommended Network Characteristics
NOTE If you intend to enable HSM Audit logging for your HSM, then see Audit Logging Overview and consider enabling logging before any other HSM activity, to ensure that all HSM actions (initialization, role creation, etc.) are logged. When deciding, be aware that HSM Audit Logging does incur a performance overhead.