Additional Security Features

  • Key and asset provisioning, management, and isolation, across different device operational scenarios
  • Support for secure debug facilities, which can be validated and authenticated via the hardware RoT