2.5.2 Secure Boot Strategy