8.5.2 Embedded Characteristics

  • Permission for Each Peripheral Access is Controlled by a Dedicated Security Bit