5.2 Design for Security

The device embeds peripherals with security features to prevent counterfeiting, to secure external communication, and to authenticate the system.

The table “Security Features” provides the list of peripherals and an overview of their security function. For more information, see the sections on each peripheral.