As embedded engineers, we are increasingly concerned with designing security into our designs while we build connected systems that are safe from hackers. This paper discusses how to implement comprehensive security architecture in embedded systems including cryptography, hardware, software and networking. We discuss how to use strong and efficient crypto for authenticating code, users and hardware for securing boot and firmware updates as well as key management and storage for device attestation andother trust elements.