...
A symmetric key will be used for both encryption and decryption, generated by the controller module. The configuration blob will contain a symmetric key attribute, to store this symmetric key.
While preparing the configuration blob, the symmetric key will be used to encrypt the sensitive information. In turn, the device certificate will be used to encrypt the symmetric key.
...