4.1.1.1.2 Boot/Root of Trust Code: Confidentiality

Some system designers may consider the confidentiality of the boot code a security objective. The idea behind this objective is that if the boot code is known, it could be analyzed for potential vulnerabilities.

Protecting the boot code confidentiality requires a multi-layered approach that spans the entire product life cycle. This includes topics that are out of scope of this document such as source code access during development and binary access in production. Topics in the scope of this document include ways to protect the boot code after being programmed into the device.