The purpose of this article is to expose some of the issues that are often overlooked when designing today’s security architectures and provide a discussion of high-integrity security solutions that create a hardware-enforced security environment. As engineers, we are responsible for system security. Therefore, we must understand the techniques for implementing and integrating solutions that match the unique requirements of the system as dictated by the value of the data to be protected. Fortunately there are excellent building blocks available for designing high-integrity, embedded environments.

Reprinted in its entirety from ARM IQ Vol. 5, No. 1, 2006