Which of the following BEST describes the primary purpose of a security kernel within a trusted computing base (TCB)?
A. To implement reference monitors that enforce access control decisions
B. To provide encryption of all system memory and storage
C. To manage the scheduling of processes and CPU time slices
D. To establish secure communications between distributed systems