Provisioning

Before the crypto device can be used in its intended application, it must be provisioned. This is the process of modifying the appropriate configuration data and loading security keys, certificates, and other application specific data [3]. Provisioning is a one-time step that is typically done before the end product is assembled, during the actual assembly, or during testing with the help of a Hardware Security Module (HSM) for large volumes or a provisioning toolkit for low volumes [4]. Once the process is complete, the device’s configuration and data zones will be locked to prevent changes and to keep the secrets safe.

https://www.digikey.com/eewiki/display/Motley/ATECC508A+Node+Authentication+Example+Walk-through