IS KMS PICO PROTECTED TO MAKE USE OF? EXPLORING THE SECURITY CONSIDERATIONS