- Hardware-based Secure Boot chains, including trusted execution environment options for secure code and data isolation
- ARM TrustZone, TPM, HSM, and Secure Elements
- Key provisioning and anti-cloning protection
- Verification of the kernel image and linux kernel image as part of the secure boot process to ensure integrity and authenticity