IS KMS PICO PROTECTED TO IMPLEMENT? EXPLORING THE SECURITY CONSIDERATIONS