whitePaper | March 17, 2022
Among security best practices, system partitioning separates and isolates security-related hardware, software, and data in a “trusted zone” and tightly limits all attempts to access trusted content from outside the zone. Non-secure software cannot directly access secure resources. The Trusted Zone isolates security-related Microcontroller Unit (MCU) hardware, software, and external devices.
Read More